{"id":27770,"date":"2019-07-11T11:44:05","date_gmt":"2019-07-11T11:44:05","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\/"},"modified":"2019-07-11T11:44:05","modified_gmt":"2019-07-11T11:44:05","slug":"wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\/","title":{"rendered":"Wondering how to whack Zoom&#8217;s dodgy hidden web server on your Mac? No worries, Apple&#8217;s done it for you"},"content":{"rendered":"<p>Apple has pushed a silent update to Macs, disabling the hidden web server installed by the popular Zoom web-conferencing software.<\/p>\n<p>A security researcher this week <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/07\/09\/zoom_mac_webcam_security_patch\/\" rel=\"noopener noreferrer\">went public<\/a> with his finding that the mechanism used to bypass a Safari prompt before entering a Zoom conference was a hidden local web server.<\/p>\n<p>Jonathan Leitschuh focused largely on the fact that a user&#8217;s webcam would likely be ON automatically, meaning that a crafty bit of web coding would give an attacker a peek into your room if you simply visit their site.<\/p>\n<p>But the presence of the web server was a more serious issue, especially since uninstalling Zoom did not remove it and the web server would reinstall the Zoom client \u2013 malware-like behaviour.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/07\/09\/shutterstock_webcam_cover.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Covering a Mac's webcam\"><\/p>\n<h2 title=\"'A legitimate solution to a poor user experience'\">Anyone for unintended ChatRoulette? Zoom installs hidden Mac web server to allow auto-join video conferencing<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2019\/07\/09\/zoom_mac_webcam_security_patch\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Although no remote execution vulnerability has been published, a web server with an unpublished API is a risk in itself. An element on a web page could link to localhost on the known Zoom port with whatever arguments it chooses.<\/p>\n<p>In response to the bad publicity, Zoom posted a series of <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/blog.zoom.us\/wordpress\/2019\/07\/10\/security-update-and-our-ongoing-efforts\/\">on-the-hoof updates<\/a>. Its initial reaction was to justify the hidden web server as &#8220;a legitimate solution to a poor user experience problem, enabling our users to have faster, one-click-to-join meetings&#8221;.<\/p>\n<p>This soon changed. On 9 July the company updated its Mac app to remove the local web server &#8220;via a prompted update&#8221;.<\/p>\n<p>The next day Apple itself took action. CEO Eric Yuan wrote on Wednesday:<\/p>\n<p>Further, Zoom promised an update in a couple of days intending that users who select &#8220;Always turn off my video&#8221; on first use will have that preference saved automatically.<\/p>\n<p>Apple appears to have concluded that it is better to protect users by silently disabling this component than to respect the wishes of those who like to think they are in control of what gets installed and removed. Few would disagree.<\/p>\n<p>There is another matter, though. On Windows, users may still be joined automatically to conferences, and with their webcam on, unless they have been careful to configure browser preferences otherwise. It is all a matter of how the .zoommtg extension is handled. Convenient, but still leaves users vulnerable to some webcam surprises. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1842\/-7432\/balancing-consumerization-and-corporate-control?td=wptl1842\">Balancing consumerization and corporate control<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/07\/11\/apple_removes_zooms_dodgy_hidden_web_server_on_mac\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>iGiant acts to protect users Apple has pushed a silent update to Macs, disabling the hidden web server installed by the popular Zoom web-conferencing software.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":27771,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-27770","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Wondering how to whack Zoom&#039;s dodgy hidden web server on your Mac? No worries, Apple&#039;s done it for you 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wondering how to whack Zoom&#039;s dodgy hidden web server on your Mac? No worries, Apple&#039;s done it for you 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-11T11:44:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Wondering how to whack Zoom&#8217;s dodgy hidden web server on your Mac? No worries, Apple&#8217;s done it for you\",\"datePublished\":\"2019-07-11T11:44:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\\\/\"},\"wordCount\":405,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\\\/\",\"name\":\"Wondering how to whack Zoom's dodgy hidden web server on your Mac? No worries, Apple's done it for you 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you.jpg\",\"datePublished\":\"2019-07-11T11:44:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wondering how to whack Zoom&#8217;s dodgy hidden web server on your Mac? No worries, Apple&#8217;s done it for you\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wondering how to whack Zoom's dodgy hidden web server on your Mac? No worries, Apple's done it for you 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\/","og_locale":"en_US","og_type":"article","og_title":"Wondering how to whack Zoom's dodgy hidden web server on your Mac? No worries, Apple's done it for you 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-07-11T11:44:05+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Wondering how to whack Zoom&#8217;s dodgy hidden web server on your Mac? No worries, Apple&#8217;s done it for you","datePublished":"2019-07-11T11:44:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\/"},"wordCount":405,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\/","url":"https:\/\/www.threatshub.org\/blog\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\/","name":"Wondering how to whack Zoom's dodgy hidden web server on your Mac? No worries, Apple's done it for you 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you.jpg","datePublished":"2019-07-11T11:44:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/wondering-how-to-whack-zooms-dodgy-hidden-web-server-on-your-mac-no-worries-apples-done-it-for-you\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Wondering how to whack Zoom&#8217;s dodgy hidden web server on your Mac? No worries, Apple&#8217;s done it for you"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27770"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27770\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/27771"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}