Mitigating ELUSIVE COMET Zoom remote control attacksTrail of BitsApril 17, 2025attacks, exploits, application security, operational securityThis post describes a sophisticated social engineering campaign using Zoom’s remote control feature and provides technical solutions to protect organizations against this attack vector.