Critical Infrastructure Security
,
Endpoint Security
,
…
Source: www.govinfosecurity.com – Read more

Social Engineering Campaign Abuses Zoom to Install Malware
Security researchers at Trail of Bits have identified a threat actor, ELUSIVE COMET, launching a social engineering campaign abusing Zoom’s remote control feature to take