Attackers could access and modify agent resources, telephone queues and other customer-service systems – and access personal information on companies’ customers.
Threatpost
Attackers could access and modify agent resources, telephone queues and other customer-service systems – and access personal information on companies’ customers.
Threatpost