Zoom's new vulnerability allows hackers to record meetings
Meetings can now be recorded by hackers in Zoom application due to a new discovered vulnerability.
NPAV has already reported that hackers have exploited the video conferencing service provider Zoom and are compromising various meetings being conducted on it. Recent reports show that Zoom has a new vulnerability that now allows hackers to record meeting and conferences.
This vulnerability was reported to be exploited even when the recording permissions are not granted by the user. The vulnerability can not only open doors for malware attacks, but hackers can also use the opportunity to launch large scale espionage campaigns against businesses, steal secrets or credentials, and much more.
If the hackers get a window where they don't require permissions from the host, there can be various campaigns that can be launched by the attackers. Hackers can steal various critical data and sensitive information can be leaked by exploiting this.
There are certain precautions that are recommended to be taken while using the application, some of these include enforcing complex Zoom meeting passwords by default for all users, credential stuffing is a known issue in the industry, and the Zoom application is one of the targets, users should not use their passwords in any other applications, implementing multi-factor authentication, and take all data breach monitoring measures required.
Use NPAV and join us on a mission to secure the cyber world.
- Other (42)
- Ransomware (128)
- Events and News (26)
- Features (45)
- Security (433)
- Tips (79)
- Google (22)
- Achievements (9)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (195)
- Cyber Attack (221)
- Data Backup (11)
- Data Breach (80)
- Phishing (139)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (56)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (7)
- vulnerability (54)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (7)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)