Positive Technologies’ researcher Egor Dimitrenko, who identified the flaws, these app process Zoom’s traffic from all conferences. In case these are compromised, the intruder could perform a Man-in-the-Middle attack.
Read full article on HackRead
Positive Technologies’ researcher Egor Dimitrenko, who identified the flaws, these app process Zoom’s traffic from all conferences. In case these are compromised, the intruder could perform a Man-in-the-Middle attack.
Read full article on HackRead