News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Trap: Fake Skype, Zoom and Google Meet websites

Some attackers use online meeting services as bait for malware. Researchers at Zscaler found fake Skype, Zoom and Google Meet websites that were used by threat actors to spread Remote Access Trojans - RAT for short. Zscaler's ThreatLabZ team warns about fake online meeting sites that distribute various malware families. Already at the beginning of December 2023, the researchers discovered a threat actor who creates fake Skype, Google Meet and Zoom websites to spread malware in order to spread remote access Trojans such as SpyNote RAT to Android users and NjRAT and DCRat to Windows users . This…

Read more

Zoom: Highly Dangerous Vulnerabilities
B2B Cyber ​​Security ShortNews

An update is recommended for users of Zoom clients on various systems. Of the currently reported vulnerabilities, two are classified as highly dangerous and three others as moderately dangerous. Zoom provides appropriate security updates for Android, iOS, Linux, macOS and Windows. The vulnerabilities reported by Zoom are 8.3 and 7.2 according to CVSS. These are not considered critical, but should be patched immediately. Zoom provides suitable patches or software updates for this. Vulnerabilities with CVSS 8.3 and 7.2 The first vulnerability with CVSS 8.3 concerns the “Incorrect implementation of trust boundary for SMB in Zoom clients”…

Read more

DDoS flood attacks on video conferences 
B2B Cyber ​​Security ShortNews

While tools like Zoom, WebEx or Microsoft Teams have made business communication much easier during the pandemic, it also opens up a new gateway for cybercriminals for DDoS attacks, as flood attack protocols are used, according to Radware. Video conferencing systems work with the Real Time Protocol (RTP). RTP is based on the User Datagram Protocol (UDP), a protocol that offers neither guaranteed delivery of packets nor a mechanism for handling packets out of order. UDP is a connectionless protocol that uses datagrams embedded in IP packets to communicate without establishing a session between two…

Read more