Mitigating ELUSIVE COMET Zoom remote control attacksDan GuidoApril 17, 2025attacks, exploits, application-security, operational securityThis post describes a sophisticated social engineering campaign using Zoom’s remote control feature and provides technical solutions to protect organizations against this attack vector.