“InfoSecCon-2025” was successfully held with tremendous audiences with various time demanding topics and keynotes at …
Read More »Hackers Exploit Zoom’s Remote Control Feature for System Access
ELUSIVE COMET is a threat actor conducting a sophisticated attack campaign that uses Zoom’s remote control feature to access victims’ computers without permission. The ELUSIVE COMET operation begins with attackers masquerading as legitimate media organizations, specifically “Bloomberg Crypto,” to invite high-profile targets for interviews. Invitations are sent through social media, …
Read More »