833-847-3280
Schedule a Call

Security Vulnerabilities in Zoom – Why Testing and Scanning are Important

Video conference

Recently, a lot of news outlets published articles on the security vulnerabilities in Zoom.  With the coronavirus forcing nearly everyone to stay home, many companies and people started using Zoom to help maintain communication.  This resulted in 200 million daily meeting participants in March, up from the 10 million users it reported in December.  They didn’t foresee that happening.

Security Vulnerabilities in Zoom

The issue is that many security researchers and cybercriminals found vulnerabilities they could exploit. One Windows vulnerability could allow someone to exploit the chat feature to steal login details. Exclusions don’t include Mac devices. One such vulnerability would allow someone to hijack a user’s device to give control of the webcam and microphone.

Eric Yaun, the CEO, stated that they will need to focus on identifying security vulnerabilities in Zoom, and addressing them quickly.

“Our platform was built primarily for enterprise customers,” Yuan said. “We did not design the product with the foresight that, in a matter of weeks, every person in the world would suddenly be working, studying, and socializing from home. Therefore, we now have a much broader set of users who are utilizing our product in a myriad of unexpected ways, presenting us with challenges we did not anticipate when the platform was conceived.”

The Fix

Exponential growth can happen to any company, with the right circumstances.  In conclusion, it’s better to conduct penetration testing and vulnerability scanning before the growth happens.  It’s better for users and better for PR.

Latest Posts

A transparent image used for creating empty spaces in columns
AI is everywhere in cybersecurity right now. AI-powered threat detection, AI-driven security analytics, and AI-assisted vulnerability management. And increasingly, AI- or automated pen testing platforms are promising to replace human penetration testers. The pitch is compelling: continuous testing, faster results, lower costs, and no need…
A transparent image used for creating empty spaces in columns
Your network probably looks like an open-floor-plan office. Once someone’s inside, they can go anywhere, talk to anyone, access anything. There are no walls, no locked doors, and no restricted areas. For an office space, that might encourage collaboration. For a network, it’s a security…
A transparent image used for creating empty spaces in columns
You know network segmentation is important. You’ve heard that flat networks enable attackers to move laterally and turn a single compromise into a full breach. But how do you actually implement segmentation? What zones do you create? What firewall rules enforce them? Where do you…
A transparent image used for creating empty spaces in columns
Every organization knows they should patch their systems. It’s basic security hygiene, right up there with using strong passwords and backing up data. Yet unpatched vulnerabilities remain one of the most common entry points in actual breaches. Not because patching is complicated or expensive, but…
A transparent image used for creating empty spaces in columns
Web application security is like maintaining a boat. You inspect the hull, find a small crack, patch it, and continue sailing. A week after that, you find another crack. You patch that too. The week after that? Another crack. This continues indefinitely because boats are…
A transparent image used for creating empty spaces in columns
 Your password isn’t enough anymore. It doesn’t matter how strong it is. It doesn’t matter if it’s 16 characters with special symbols and numbers. And it doesn’t matter if you’ve never written it down or shared it with anyone. Passwords alone are no longer…
contact

Our Team

This field is for validation purposes and should be left unchanged.
Name(Required)
On Load
Where? .serviceMM
What? Mega Menu: Services