In this publication, Check Point describes a technique which would have allowed a threat actor to potentially identify and join active meetings.
https://research.checkpoint.com/2020/zoom-zoom-we-are-watching-you/
In this publication, Check Point describes a technique which would have allowed a threat actor to potentially identify and join active meetings.
https://research.checkpoint.com/2020/zoom-zoom-we-are-watching-you/