Shailesh Athalye April 6, 2020August 10, 2020 - 7 min read Secure Remote Endpoints from Vulnerabilities in Video Conferencing & Productivity Applications like Zoom