Zoom
Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware
Tom Eston | | account hacking, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, facebook, google, hacked, Hacking, Information Security, Infosec, Instagram, Malware, Meeting Invite, Meta, Microsoft Teams, online, Podcast, Podcasts, Privacy, rat, RATs, remote-access Trojan, security, social media, Spoofed Online Meetings, spoofing, Teams, technology, Weekly Edition, Zoom
In episode 320, Tom and Scott discuss the contentious issue of who is accountable when Facebook or Instagram accounts are hacked, discussing potential failings on both the user’s and Meta’s part. They ...
Don’t Let Zombie Zoom Links Drag You Down
BrianKrebs | | A Little Sunshine, Charan Akiri, Latest Warnings, linkedin, The Coming Storm, Zoom, Zoom Personal Meeting ID
Many organizations — including quite a few Fortune 500 firms — have exposed web links that allow anyone to initiate a Zoom video conference meeting as a valid employee. These company-specific Zoom ...
Attackers Manipulate Teams Features to Gain Access
Microsoft Teams recently made it into a top 10 list of most-targeted applications—and that should be a warning to security teams whose organizations use it. The app is one of the “most ...
Security Boulevard
Zoom Taps Okta to Bring Zero-Trust Cybersecurity to Videoconferences
Okta and Zoom today announced an integration through which cybersecurity administrators will be able to centrally manage end-to-end encryption across the Zoom videoconferencing platform. The Okta Authentication for End-to-End Encryption (E2EE) makes ...
Security Boulevard
Why Zero-Trust in Video Conferencing is Crucial
By now you’ve likely heard the term “zero-trust” and how it relates to cybersecurity. A few years ago, it was in more of a conceptual stage, two attached words floating about like ...
Security Boulevard
How to Create a Digital Workplace Governance Program
In a recent discussion with a client concerning a digital workplace initiative, they related that some of the data they were migrating to SharePoint Online hadn’t been edited since the early 1990s ...
Security Boulevard
Zoom Hot-Mic Bug: Is China Listening?
Richi Jennings | | macos, microphone hacking, patch, Privacy, SB Blogwatch, Seems like weasel words from Zoom who seem worryingly shifty, Zoom
Zoom users on macOS have noticed the microphone stays on after a meeting has ended ...
Security Boulevard
Zoom Monitoring with Tripwire Configuration Manager
Ben Layer | | Cloud, communication, Security Configuration Management, Tripwire Configuration Manager., Zoom
Last month, we covered how Tripwire Configuration Manager can audit your cloud service provider accounts like AWS, Azure, GCP, and other cloud-based services such as Salesforce. In this blog, we will continue our ...
Zoom CISO’s Lessons in Scaling With Simplicity
I joined Zoom in July 2020 — a time when everything about the company had fundamentally changed. The expectations for service delivery were higher than ever, growth reached an unprecedented scale and ...
Security Boulevard
Ask Chloé: How to Address Zoom Fatigue
Chloe Messdaghi | | cybersecurity burnout, fatigue, women, women in cybersecurity, women in devops, Women In Infosec, Women in security, Women In Tech, Zoom
Welcome to the Ask Chloé column on Security Boulevard! Each week, Chloé provides answers to readers’ questions to help guide them as they navigate the technology industry. This week, Chloé helps a reader address both ...
Security Boulevard