{"id":34072,"date":"2020-03-27T21:49:46","date_gmt":"2020-03-27T21:49:46","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\/"},"modified":"2020-03-27T21:49:46","modified_gmt":"2020-03-27T21:49:46","slug":"yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\/","title":{"rendered":"Yeah, that Zoom app you&#8217;re trusting with work chatter? It lives with &#8216;vampires feeding on the blood of human data&#8217;"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/03\/09\/googlejamboard.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>As the global coronavirus pandemic pushes the popularity of videoconferencing app Zoom to new heights, one web veteran has sounded the alarm over its &#8220;creepily chummy&#8221; relationship with tracking-based advertisers.<\/p>\n<p>Doc Searls, co-author of the influential internet marketing book The Cluetrain Manifesto last century, <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/blogs.harvard.edu\/doc\/2020\/03\/27\/zoom\">today warned<\/a> [<a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/webcache.googleusercontent.com\/search?q=cache:RxLbT_LzyRMJ:https:\/\/blogs.harvard.edu\/doc\/2020\/03\/27\/zoom\/&amp;hl=en&amp;gl=us&amp;strip=1&amp;vwsrc=0\">cached<\/a>] Zoom not only has the right to extract data from its users and their meetings, it can work with Google and other ad networks to turn this personal information into targeted ads that follow them across the web.<\/p>\n<p>This personal info includes, and is not limited to, names, addresses and any other identifying data, job titles and employers, Facebook profiles, and device specifications. Crucially, it also includes &#8220;the content contained in cloud recordings, and instant messages, files, whiteboards &#8230; shared while using the service.&#8221;<\/p>\n<p>Searls said reports outlining how Zoom was <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.consumerreports.org\/video-conferencing-services\/zoom-teleconferencing-privacy-concerns\/\">collecting and sharing user data<\/a> with advertisers, marketers, and other companies, prompted him to pore over the software maker&#8217;s <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/zoom.us\/privacy\">privacy policy<\/a> to see how it processes calls, messages, and transcripts.<\/p>\n<p>And he concluded: &#8220;Zoom is in the advertising business, and in the worst end of it: the one that lives off harvested personal data.<\/p>\n<p>&#8220;What makes this extra creepy is that Zoom is in a position to gather plenty of personal data, some of it very intimate (for example with a shrink talking to a patient) without anyone in the conversation knowing about it. (Unless, of course, they see an ad somewhere that looks like it was informed by a private conversation on Zoom.)&#8221;<\/p>\n<p>The privacy policy, as of March 18, lumps together a lot of different types of personal information, from contact details to meeting contents, and says this info may be used, one way or another, to personalize web ads to suit your interests.<\/p>\n<p>&#8220;Zoom does use certain standard advertising tools which require personal data,&#8221; the fine-print states. &#8220;We use these tools to help us improve your advertising experience (such as serving advertisements on our behalf across the internet, serving personalized ads on our website, and providing analytics services) &#8230; For example, Google may use this data to improve its advertising services for all companies who use their services.&#8221;<\/p>\n<p>Searls, a former Harvard Berkman Fellow, said netizens are likely unaware their information could be harvested from their Zoom accounts and video conferences for advertising and tracking across the internet: &#8220;A person whose personal data is being shed on Zoom doesn\u2019t know that\u2019s happening because Zoom doesn\u2019t tell them. There\u2019s no red light, like the one you see when a session is being recorded.<\/p>\n<p>&#8220;Nobody goes to Zoom for an &#8216;advertising experience,&#8217; personalized or not. And nobody wants ads aimed at their eyeballs elsewhere on the &#8216;net by third parties using personal information leaked out through Zoom.&#8221;<\/p>\n<p><em>The Register<\/em> asked Zoom, which offers free and paid-for conferencing plans, for comment on the critique, and has yet to hear back from the developer.<\/p>\n<p>&#8220;Zoom doesn\u2019t need to be in the advertising business, least of all in the part of it that lives like a vampire off the blood of human data,&#8221; Searls continued.<\/p>\n<p>&#8220;If Zoom needs more money, it should charge more for its services, or give less away for free &#8230; What Zoom\u2019s current privacy policy says is worse than &#8216;You don\u2019t have any privacy here.&#8217; It says, &#8216;We expose your virtual necks to data vampires who can do what they will with it.&#8217; Please fix it, Zoom. As for Zoom\u2019s competitors, there\u2019s a great weakness to exploit here.&#8221;<\/p>\n<p>The Zoom privacy policy, for what it&#8217;s worth, states: &#8220;We do not allow marketing companies, advertisers, or anyone else to access personal data in exchange for payment &#8230; in our humble opinion, we don\u2019t think most of our users would see us as selling their information, as that practice is commonly understood.&#8221;<\/p>\n<p>Meanwhile, shares in Zoom are <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/finance.yahoo.com\/quote\/ZM\/\">up seven per cent today<\/a> and 26 per cent over the past month. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1916\/-8373\/practical-tips-for-office-365-tenant-to-tenant-migration?td=wptl1916\">Practical tips for Office 365 tenant-to-tenant migration<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2020\/03\/27\/doc_searls_zoom_privacy\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Doc Frown: Searls decries video-conferencing software&#8217;s &#8216;creepy&#8217; closeness with ad tracking As the global coronavirus pandemic pushes the popularity of videoconferencing app Zoom to new heights, one web veteran has sounded the alarm over its &#8220;creepily chummy&#8221; relationship with tracking-based advertisers.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34073,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-34072","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Yeah, that Zoom app you&#039;re trusting with work chatter? It lives with &#039;vampires feeding on the blood of human data&#039; 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Yeah, that Zoom app you&#039;re trusting with work chatter? It lives with &#039;vampires feeding on the blood of human data&#039; 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-27T21:49:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"433\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Yeah, that Zoom app you&#8217;re trusting with work chatter? It lives with &#8216;vampires feeding on the blood of human data&#8217;\",\"datePublished\":\"2020-03-27T21:49:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\\\/\"},\"wordCount\":685,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\\\/\",\"name\":\"Yeah, that Zoom app you're trusting with work chatter? It lives with 'vampires feeding on the blood of human data' 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data.jpg\",\"datePublished\":\"2020-03-27T21:49:46+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data.jpg\",\"width\":650,\"height\":433},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Yeah, that Zoom app you&#8217;re trusting with work chatter? It lives with &#8216;vampires feeding on the blood of human data&#8217;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Yeah, that Zoom app you're trusting with work chatter? It lives with 'vampires feeding on the blood of human data' 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\/","og_locale":"en_US","og_type":"article","og_title":"Yeah, that Zoom app you're trusting with work chatter? It lives with 'vampires feeding on the blood of human data' 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-03-27T21:49:46+00:00","og_image":[{"width":650,"height":433,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Yeah, that Zoom app you&#8217;re trusting with work chatter? It lives with &#8216;vampires feeding on the blood of human data&#8217;","datePublished":"2020-03-27T21:49:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\/"},"wordCount":685,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\/","url":"https:\/\/www.threatshub.org\/blog\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\/","name":"Yeah, that Zoom app you're trusting with work chatter? It lives with 'vampires feeding on the blood of human data' 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data.jpg","datePublished":"2020-03-27T21:49:46+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data.jpg","width":650,"height":433},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/yeah-that-zoom-app-youre-trusting-with-work-chatter-it-lives-with-vampires-feeding-on-the-blood-of-human-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Yeah, that Zoom app you&#8217;re trusting with work chatter? It lives with &#8216;vampires feeding on the blood of human data&#8217;"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34072","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34072"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34072\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34073"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34072"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34072"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}