Shailesh Athalye August 10, 2020 - 7 min read Secure Remote Endpoints from Vulnerabilities in Video Conferencing & Productivity Applications like Zoom