Zoom Company Cyber Security Posture

www.zoom.com

Bring teams together, reimagine workspaces, engage new audiences, and delight your customers โ€“โ€“ all on the Zoom AI-first work platform you know and love. ๐Ÿ’™ Zoomies help people stay connected so they can get more done together. We set out on a mission to make video communications frictionless and secure by building the worldโ€™s best video product for the enterprise, but we didnโ€™t stop there. With products like AI Companion, Team Chat, Contact Center, Phone, Events, Rooms, Webinar, Contact Center and more, we bring innovation to a wide variety of customers, from the conference room to the classroom, from doctorโ€™s offices to financial institutions to government agencies, from global brands to small businesses. We do what we do because of our core value of Care: care for our community, our customers, our company, our teammates, and ourselves. Our global employees help our customers meet happier, communicate better, and create meaningful connections the world over. Zoomies are problem-solvers and self-starters, working hard to get results and moving quickly to design solutions with our customers and users in mind. Here, you'll find room to grow with opportunities to stretch your skills and advance your career in a collaborative, growth-focused environment. Learn more about careers at Zoom by visiting our careers site: https://careers.zoom.us/home

Zoom Company Details

Linkedin ID:

zoom

Website:
Employees number:

11511 employees

Number of followers:

609070.0

NAICS:

541

Industry Type:

IT Services and IT Consulting

Homepage:

www.zoom.com

IP Addresses:

Scan still pending

Company ID:

ZOO_2866788

Scan Status:

In-progress

AI scoreZoom Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Zoom Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Zoom Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
ZoomVulnerability257/2025ZOO619070925Link
Rankiteo Explanation :
Attack without any consequences: Attack in which data is not compromised

Description: Recently, two vulnerabilities were discovered in specific Zoom Clients for Windows, which could enable attackers to launch Denial of Service (DoS) attacks. These flaws, tracked under CVE-2025-49464 and CVE-2025-46789, were reported by security researcher fre3dm4n and carry a Medium severity rating with a CVSS score of 6.5 each. The vulnerabilities stem from a classic buffer overflow issue in the affected Zoom products. This flaw could enable an authorized user with network access to exploit the system, causing a DoS condition that disrupts service availability. The CVSS vector string for both issues indicates a high impact on availability, though confidentiality and integrity remain unaffected. The potential for disruption is significant for organizations relying on Zoom for communication. The vulnerabilities impact multiple Zoom products for Windows, with slight variations in affected versions between the two CVEs.

Zoom Company Subsidiaries

SubsidiaryImage

Bring teams together, reimagine workspaces, engage new audiences, and delight your customers โ€“โ€“ all on the Zoom AI-first work platform you know and love. ๐Ÿ’™ Zoomies help people stay connected so they can get more done together. We set out on a mission to make video communications frictionless and secure by building the worldโ€™s best video product for the enterprise, but we didnโ€™t stop there. With products like AI Companion, Team Chat, Contact Center, Phone, Events, Rooms, Webinar, Contact Center and more, we bring innovation to a wide variety of customers, from the conference room to the classroom, from doctorโ€™s offices to financial institutions to government agencies, from global brands to small businesses. We do what we do because of our core value of Care: care for our community, our customers, our company, our teammates, and ourselves. Our global employees help our customers meet happier, communicate better, and create meaningful connections the world over. Zoomies are problem-solvers and self-starters, working hard to get results and moving quickly to design solutions with our customers and users in mind. Here, you'll find room to grow with opportunities to stretch your skills and advance your career in a collaborative, growth-focused environment. Learn more about careers at Zoom by visiting our careers site: https://careers.zoom.us/home

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=zoom' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Zoom Cyber Security News

2024-11-13T08:00:00.000Z
Zoom App Vulnerability Let Attackers Execute Remote Code

Zoom recently disclosed multiple vulnerabilities affecting its suite of applications, including a critical flaw that could allow attackers toย ...

2025-06-19T07:00:00.000Z
BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with macOS Backdoor Malware

The attack chain is designed to entice victims into joining the bogus Zoom call and coax them to download a malicious payload that masqueradesย ...

2025-04-23T07:00:00.000Z
WARNINGโ—๏ธHackers Exploit Zoom โ€˜Remote Controlโ€™ Feature Allowing System Access

The hacking group known as Elusive Comet targets the cryptocurrency users in sophisticated social engineering tactics that abuse Zoom's remoteย ...

2025-04-18T07:00:00.000Z
The Zoom attack you didnโ€™t see coming

โ€œThe attackers refused to communicate via email and directed scheduling through Calendly pages that clearly weren't official Bloombergย ...

2024-12-17T08:00:00.000Z
A major cybersecurity vendor now has its own "AI brain" that can keep hackers out

Cybersecurity vendors enter their AI brain era ยท It can hold onto institutional knowledge about attacks and weak points that might get lostย ...

2025-06-05T07:00:00.000Z
Beware of Fake Zoom Client Downloads Granting Attackers Access to Your Computer

Clicking the โ€œJoinโ€ button redirects the user to a non-malicious HTML page that prompts them to install the latest Zoom client. This socialย ...

2025-02-04T08:00:00.000Z
Pinch A Dollar, Compromise A Terabyte

By Richard H. Levey. The weakest elements of a nonprofit's cybersecurity defense drank coffee in the breakroom this morning.

2025-05-19T07:00:00.000Z
Phishing Campaign Masquerades as Zoom Meeting Invites to Capture Login Credentials

A sophisticated phishing campaign is currently targeting corporate users by mimicking urgent Zoom meeting invitations from colleagues,ย ...

2025-05-13T07:00:00.000Z
Zoom Fixes High-Risk Flaw in Latest Update

This type of bug occurs when there's a delay between a system checking if an action is safe and performing it. During that short window,ย ...

similarCompanies

Zoom Similar Companies

Infosys

Infosys is a global leader in next-generation digital services and consulting. We enable clients in more than 50 countries to navigate their digital transformation. With over three decades of experience in managing the systems and workings of global enterprises, we expertly steer our clients through

Globant

At Globant, we create the digitally-native products that people love. We bridge the gap between businesses and consumers through technology and creativity, leveraging our experience as an AI powerhouse. We dare to digitally transform organizations and strive to delight their customers. - We have mo

Neusoft

Neusoft provides innovative information technology โ€“ enabled solutions and services to meet the demands arising from social transformation, to shape new life styles for individuals and to create values for the society. Focusing on software technology, Neusoft provides industrial solutions, smart con

Zebra Technologies

Zebra (NASDAQ: ZBRA) helps organizations monitor, anticipate, and accelerate workflows by empowering their frontline and ensuring that everyone and everything is visible, connected and fully optimized. Our award-winning portfolio spans software to innovations in robotics, machine vision, automation

A AeC รฉ apontada consistentemente como a lรญder brasileira na entrega de soluรงรตes de experiรชncia do cliente e gestรฃo de processos terceirizados. Servindo as principais marcas do mercado nacional, conquistou nos trรชs รบltimos anos a posiรงรฃo de Empresa do Ano de BPO pela conceituada Frost and Sullivan

TransUnion

TransUnion is a global information and insights company that makes trust possible in the modern economy. We do this by providing an actionable picture of each person so they can be reliably represented in the marketplace. As a result, businesses and consumers can transact with confidence and achiev

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Zoom CyberSecurity History Information

How many cyber incidents has Zoom faced?

Total Incidents: According to Rankiteo, Zoom has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at Zoom?

Incident Types: The types of cybersecurity incidents that have occurred incident Vulnerability.

How does Zoom detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through remediation measures with Apply the latest patches.

Incident Details

Can you provide details on each incident?

Incident : Vulnerability Exploitation

Title: Zoom Client Vulnerabilities Enable DoS Attacks

Description: Two vulnerabilities (CVE-2025-49464 and CVE-2025-46789) discovered in Zoom Clients for Windows can enable attackers to launch Denial of Service (DoS) attacks.

Type: Vulnerability Exploitation

Attack Vector: Buffer Overflow

Vulnerability Exploited: CVE-2025-49464, CVE-2025-46789

Motivation: Disruption of Service

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Impact of the Incidents

What was the impact of each incident?

Incident : Vulnerability Exploitation ZOO619070925

Systems Affected: Zoom Workplace for Windows, Zoom Workplace VDI for Windows, Zoom Rooms for Windows, Zoom Rooms Controller for Windows, Zoom Meeting SDK for Windows

Operational Impact: Disruption of Communication Services

Which entities were affected by each incident?

Incident : Vulnerability Exploitation ZOO619070925

Entity Type: Software Company

Industry: Communication Technology

Response to the Incidents

What measures were taken in response to each incident?

Incident : Vulnerability Exploitation ZOO619070925

Remediation Measures: Apply the latest patches

Data Breach Information

What measures does the company take to prevent data exfiltration?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Apply the latest patches.

Lessons Learned and Recommendations

What lessons were learned from each incident?

Incident : Vulnerability Exploitation ZOO619070925

Lessons Learned: Ensuring that software is up to date is critical in safeguarding against potential exploits.

What recommendations were made to prevent future incidents?

Incident : Vulnerability Exploitation ZOO619070925

Recommendations: Stay vigilant about software updates to protect against buffer overflow issues.

What are the key lessons learned from past incidents?

Key Lessons Learned: The key lessons learned from past incidents are Ensuring that software is up to date is critical in safeguarding against potential exploits.

What recommendations has the company implemented to improve cybersecurity?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Stay vigilant about software updates to protect against buffer overflow issues..

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident?

Incident : Vulnerability Exploitation ZOO619070925

Root Causes: Buffer overflow in Zoom products

Corrective Actions: Apply patches to affected Zoom products

What corrective actions has the company taken based on post-incident analysis?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Apply patches to affected Zoom products.

Additional Questions

Impact of the Incidents

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident were Zoom Workplace for Windows, Zoom Workplace VDI for Windows, Zoom Rooms for Windows, Zoom Rooms Controller for Windows, Zoom Meeting SDK for Windows.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Ensuring that software is up to date is critical in safeguarding against potential exploits.

What was the most significant recommendation implemented to improve cybersecurity?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Stay vigilant about software updates to protect against buffer overflow issues..

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge