{"version":"1.0","provider_name":"Xiarch Solutions Private Limited","provider_url":"https:\/\/xiarch.com\/blog","author_name":"Xiarch Security","author_url":"https:\/\/xiarch.com\/blog\/author\/vector\/","title":"How Hackers Employ Phishing Attacks using Zoom? - Xiarch Solutions Private Limited","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"U5xwxBuVXR\"><a href=\"https:\/\/xiarch.com\/blog\/how-hackers-employ-phishing-attacks-using-zoom\/\">How Hackers Employ Phishing Attacks using Zoom?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/xiarch.com\/blog\/how-hackers-employ-phishing-attacks-using-zoom\/embed\/#?secret=U5xwxBuVXR\" width=\"600\" height=\"338\" title=\"&#8220;How Hackers Employ Phishing Attacks using Zoom?&#8221; &#8212; Xiarch Solutions Private Limited\" data-secret=\"U5xwxBuVXR\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/02\/hackers-employ-zoom-application-featured-image-1.jpg","thumbnail_width":860,"thumbnail_height":520,"description":"In the period of the pandemic, businesses are facing multiple challenges and while keeping the ball in motion the organization is shifting to remote work culture. While working from home, video conferencing applications like Zoom are becoming a very popular medium used for discussing plans and work developments. Everything has its advantages and disadvantages like [&hellip;]"}