Skip to content

Zoom Meeting Vulnerabilities

Zoom Vulnerabilities – Make sure you are protected

Zoom, the popular internet meeting system, has had multiple vulnerabilities discovered in it.

 

Whilst vulnerabilities are discovered every day, we felt the need to make a post directing attention to this one in particular due to the easy of exploitation and the amount of Zoom that is used by our clients across many industries.

 

AdvantagePROTECT clients had a mitigation pushed to their endpoints yesterday to deal with this issue, and our AdvantageMANAGE clients have had a policy rolled out today to solve the most critical issues.

 

MacOS users are known to be the most affected by this issue, so those users should make sure they have removed and reinstalled the Zoom client with the latest version.

Unfortunately the Zoom client doesn’t lend itself to be auto updated easily, but users that are concerned can contact us for advice.

https://www.wired.com/story/zoom-bug-webcam-hackers/

https://www.theverge.com/2019/7/9/20688113/zoom-apple-mac-patch-vulnerability-emergency-fix-web-server-remove

Facebook
Twitter
LinkedIn

Related Posts

So, in recent times we’ve seen airline Qantas falling victim to a cyberattack which hit a third-party contact centre platform potentially exposing personal details of up to 6 million customers. On the NZ side of the ditch, New World took an arrow to the knee with a password spraying attack.
The landscape of remote work has transformed dramatically over the past several years. What began as a reactive shift to keep operations going during a major global disruption has now solidified into a permanent mode of working for many organisations, especially small businesses.
On Friday, 30th June 2025, Qantas confirmed a cyber incident affecting one of its offshore third-party contact centres. Approximately six million customer records were accessed, exposing personal information including names, contact details (email and phone number), Date of Birth and frequent flyer numbers. No financial or authentication credentials (such as passwords or card data) were determined to be accessed at this time.