Latest spoofing publications
As more workers rush to adopt remote working technologies such as cloud-based teleconferencing or collaboration tools, cyber security companies have been quick to identify the ways in which hackers might exploit the situation to compromise users.
The latest company to do so is Check Point Software, whose researchers have penned a fresh blog post detailing how cyber hackers are taking advantage of surging demand for Zoom, conferencing software that has become a household name in recent weeks.