Threat Intelligence Report

Threat Intelligence Report:Zoom Video Conferencing & Communications 1

services are being used by education institutions, government officials, business across all industries and personal communications. However, with the rise in use, security and privacy concerns have continued to rise bringing into question the safety of business and individual users in relying upon Zoom’s applications and services. Especially considering the large numbers of Zoombombing attacks and multiple critical zero-day vulnerabilities released of late.

Fortress Information Security (FIS) will continue to monitor this vendor and will update this report with any new findings and vulnerabilities as they come out.

Threat Intelligence Report:Zoom Video Conferencing & Communications 2
Utilities
Threat Intelligence Report:Zoom Video Conferencing & Communications 3
Transportation
Threat Intelligence Report:Zoom Video Conferencing & Communications 4
Healthcare
Threat Intelligence Report:Zoom Video Conferencing & Communications 5
Finance
Threat Intelligence Report:Zoom Video Conferencing & Communications 6
Energy
Threat Intelligence Report:Zoom Video Conferencing & Communications 7
Additional Industries
Threat Intelligence Report:Zoom Video Conferencing & Communications 8

Threat Intelligence Report:Zoom Video Conferencing & Communications 9 Threat Intelligence Report:Zoom Video Conferencing & Communications 10 Threat Intelligence Report:Zoom Video Conferencing & Communications 11

189 S. Orange Avenue, Ste 1950, Orlando, FL 32801
(407) 573.6800
sales@fortressinfosec.com

COPYRIGHT © 2020. FORTRESS INFORMATION SECURITY. ALL RIGHTS RESERVED. PRIVACY POLICY

DOWNLOAD THE FULL

THREAT INTELLIGENCE REPORT

ORACLE LINUX 7 REPOSITORIES INFECTED WITH “HTML.EXPLOIT.C99-24” EXPLOIT

DOWNLOAD THE FULL

THREAT INTELLIGENCE REPORT

ZOOM VIDEO CONFERENCING AND COMMUNICATIONS

THREAT INTELLIGENCE REPORT

Windows CryptoAPI Vulnerability

White Paper

Asset to Vendor Network for Power Utilities

PRESS RELEASE

FORTRESS LAUNCHES INNOVATIVE COLLABORATION TO HELP PROTECT THE POWER GRID FROM CYBER THREATS

Emerging Risk Brief

ASSET RISK MANAGEMENT - FOR PORT AUTHORITIES

Advisory

5 STEPS FOR AN EFFECTIVE THIRD PARTY VENDOR RISK PROGRAM

White Paper

CIP COMPLIANCE – UPDATES, ENFORCEMENT AND PRACTICAL IMPLEMENTATION

Advisory

5 STEPS TO A STRONG VULNERABILITY MANAGEMENT PROGRAM

WHITE PAPER

NERC CIP COMPLIANCE

Subscribe to Fortress Newsletter

For breach reports, threat intelligence, regulatory updates, cyber security news alerts and more, sign up to receive the Fortress Newsletter.

No, thanks!

Threat Advisory

Outdated Security Appliance Facilitates Denial-of-Service Attack on U.S. Grid

WEBINAR DOCUMENT

NERC CIP SUPPLY CHAIN SECURITY STANDARDS