On the heels of Zoom's iPhone privacy blunder, a security researcher has found that attackers can use the Zoom Windows client's group chat feature to share links that will leak the Windows network ...
Video conferencing software Zoom is working on patching a zero-day vulnerability that was disclosed online earlier today in a blog post by cyber-security firm ACROS Security. The security firm said ...
The Zoom client has a vulnerability that can leak your Windows 10 sign-in information, and until there's a permanent fix, you can use this workaround. When you purchase through links on our site, we ...
Researchers said that the issue is only exploitable on Windows 7 and earlier. A newly discovered bug in the Zoom Client for Windows could allow remote code-execution, according to researchers at ...
Update: Zoom confirmed it has patched the vulnerability in Zoom client version 5.1.3. An unpatched and previously unknown security vulnerability has been discovered in the Zoom Client for Windows, ...
An exploit for a zero-day remote code execution vulnerability affecting the Zoom Windows client is currently being sold for $500,000, together with one designed to abused a bug in the video ...
Zoom has announced today the launch of an automatic update feature designed to streamline the update process for desktop clients. The new feature is currently available only for desktop Zoom clients ...
The Zoom videoconferencing platform was affected by a zero-day vulnerability that could have allowed attackers to execute commands remotely on affected machines. The flaw impacted devices running the ...
An unpatched and previously unknown vulnerability in the Zoom Client for Windows, known as a zero-day, has been disclosed by security company 0patch. Mitja Kolsek, 0patch co-founder, said that the ...
Forbes contributors publish independent expert analyses and insights. Kate O’Flaherty is a cybersecurity and privacy journalist. The Zoom Windows client is at risk from a flaw in the chat feature that ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results