
Brian Fung | @[email protected] @b_fung
That flaw depends on an attacker running malware within Zoom’s process space that “inherits” all of Zoom’s access privileges, according to the SAA. — PolitiTweet.org
Created
Thu Apr 09 13:57:57 +0000 2020
Likes
2
Retweets
1
Source
TweetDeck
View Raw Data
JSON DataView on Twitter
Likely AvailableBrian Fung | @[email protected] @b_fung
That flaw depends on an attacker running malware within Zoom’s process space that “inherits” all of Zoom’s access privileges, according to the SAA. — PolitiTweet.org