Risky Bulletin cover image

Sponsored: Sublime Security on Zoom attacks

Risky Bulletin

00:00

Two Zoom-based attack patterns

Catalina outlines two abuse methods: luring to legitimate meetings and booby-trapped Zoom installers.

Play episode from 00:14
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app