
Sponsored: Sublime Security on Zoom attacks
Risky Bulletin
00:00
Two Zoom-based attack patterns
Catalina outlines two abuse methods: luring to legitimate meetings and booby-trapped Zoom installers.
Play episode from 00:14
Transcript

Catalina outlines two abuse methods: luring to legitimate meetings and booby-trapped Zoom installers.