by Matthew Hilsenrad, Director of Disaster Recovery at Abacus Group.
As employees are working remotely more than ever, usage of collaboration tools has significantly increased. Zoom has been a leader in adoption by many for videoconferencing. As a result, they've also become a target for malicious attackers. There have been a number of Zoom vulnerabilities widely disclosed, one of which is a zero day exploit.
What can I do?
Zoom has released a critical update that fixes a recent vulnerability regarding UNC (Universal Naming Convention) paths. We urge all Zoom users to accept this patch upgrade when prompted. Please note that if users don't accept the patch on the first attempt, it will be automatically applied the next time the application is launched.