With a festive look and the participation of more than one hundred participants from Bangladesh …
Read More »Hackers Exploit Zoom’s Remote Control Feature for System Access
ELUSIVE COMET is a threat actor conducting a sophisticated attack campaign that uses Zoom’s remote control feature to access victims’ computers without permission. The ELUSIVE COMET operation begins with attackers masquerading as legitimate media organizations, specifically “Bloomberg Crypto,” to invite high-profile targets for interviews. Invitations are sent through social media, …
Read More »