{"id":34336,"date":"2020-04-10T12:46:43","date_gmt":"2020-04-10T12:46:43","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=543807"},"modified":"2020-04-10T12:46:43","modified_gmt":"2020-04-10T12:46:43","slug":"this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/","title":{"rendered":"This Week in Security News: Exploring Common Threats to Cloud Security and Zoom Removes Meeting IDs from App Title Bar to Improve Privacy"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"week in security\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about why Zoom has released an update for its Linux, Mac, and Windows apps that removes the meeting ID from the app\u2019s title bar. Also, read about Trend Micro\u2019s latest research on cloud-specific security, with examples of threats and risks that organizations could face when migrating to the cloud or using cloud services.<\/p>\n<p>Read on:<\/p>\n<p><a href=\"https:\/\/solutionsreview.com\/security-information-event-management\/trend-micro-study-shows-cloud-misconfiguration-as-major-threat\/\"><strong>Trend Micro Study Shows Cloud Misconfiguration as Major Threat<\/strong><\/a><\/p>\n<p><em>This week, Trend Micro&nbsp;<\/em><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/virtualization-and-cloud\/exploring-common-threats-to-cloud-security\"><em>released<\/em><\/a><em>&nbsp;new research findings concerning cloud security, a major area of concern for enterprises of all sizes. The research confirms the role of both human errors and complex deployments in creating cloud-based cyber threats; above all, Trend Micro notes the dangers of cloud misconfiguration to cloud environments.&nbsp;&nbsp;<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/ncsa-small-business-webinar-series\/\"><strong>NCSA Small Business Webinar Series<\/strong><\/a><\/p>\n<p><em>The National Cyber Security Alliance is hosting a series of webinars for small business owners, and Trend Micro is proud to support this effort with guest speakers sharing threat intelligence and security expertise. The topics will help small companies deal with the challenges of COVID-19, including sessions on telework, digital spring cleaning, e-commerce security, how to avoid COVID-19 scams and more.<\/em><\/p>\n<p><a href=\"https:\/\/threatpost.com\/cisco-critical-update-phishing-webex\/154585\/\"><strong>Cisco \u2018Critical Update\u2019 Phishing Attack Steals Webex Credentials<\/strong><\/a><\/p>\n<p><em>An ongoing phishing campaign is reeling in victims with a recycled Cisco security advisory that warns of a critical vulnerability. The campaign urges victims to \u201cupdate,\u201d only to steal their credentials for Cisco\u2019s Webex web conferencing platform instead. The campaign is looking to leverage the wave of remote workers who have come to rely on online conferencing tools like Webex and other platforms.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/principles-of-a-cloud-migration-from-step-one-to-done\/\"><strong>Principles of a Cloud Migration \u2013 From Step One to Done<\/strong><\/a><\/p>\n<p><em>Cloud migrations are happening every day and&nbsp;analysts predict over 75% of mid-size to large enterprises will migrate a workload to the cloud by 2021 \u2013 but how can you make sure your workload is successful? In this multi-part blog series, Trend Micro explores best practices, forward thinking, and use cases around creating a successful cloud migration from multiple perspectives.&nbsp;&nbsp;<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/zoomed-in-a-look-into-a-coinminer-bundled-with-zoom-installer\/\"><strong>Zoomed In: A Look into a Coinminer Bundled with Zoom Installer<\/strong><\/a><\/p>\n<p><em>Trend Micro recently found a Coinminer bundled with the legitimate installer of video conferencing app Zoom, luring users who want to install the software but end up downloading a malicious file. The compromised files are assumed to come from fraudulent websites. Trend Micro has been working with Zoom to ensure that they are able to communicate this to their users appropriately.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/investigation-into-a-nefilim-attack-shows-signs-of-lateral-movement-possible-data-exfiltration\"><strong>Investigation into a Nefilim Attack Shows Signs of Lateral Movement, Possible Data Exfiltration<\/strong><\/a><\/p>\n<p><em>Trend Micro\u2019s Managed XDR (MxDR) and Incident Response (IR) teams recently investigated an incident involving a company that was hit by the Nefilim ransomware, which was initially discovered in March 2020. What makes Nefilim especially devious is that the threat actors behind the attack threaten to release the victim\u2019s stolen data on an online leak site.<\/em><\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/\"><strong>Zoom Removes Meeting IDs from App Title Bar to Improve Privacy<\/strong><\/a><\/p>\n<p><em>Video conferencing service Zoom has released an update for its&nbsp;<\/em><a href=\"https:\/\/support.zoom.us\/hc\/en-us\/articles\/205759689-New-Updates-for-Linux\"><em>Linux<\/em><\/a><em>,&nbsp;<\/em><a href=\"https:\/\/support.zoom.us\/hc\/en-us\/articles\/201361963-New-Updates-for-macOS\"><em>Mac<\/em><\/a><em>, and&nbsp;<\/em><a href=\"https:\/\/support.zoom.us\/hc\/en-us\/articles\/201361953-New-Updates-for-Windows\"><em>Windows<\/em><\/a><em>&nbsp;apps that removes the meeting ID from the app\u2019s title bar.<\/em> <em>The update comes after the company\u2019s users have often leaked their meeting IDs, and even meeting passwords, when sharing screenshots of their meetings on social media.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/analysis-suspicious-very-hidden-formula-on-excel-4-0-macro-sheet\"><strong>Analysis: Suspicious \u201cVery Hidden\u201d Formula on Excel 4.0 Macro Sheet<\/strong><\/a><\/p>\n<p><em>A malicious Microsoft Excel 4.0 Macro sheet with a suspicious formula that is set as \u201cVery Hidden\u201d was submitted by a customer and further analyzed by Trend Micro researchers. The sheet is not readily accessible via the Microsoft Excel User Interface (UI) due to a feature documented in the Microsoft website that allows users to hide sheets. The compromised files were commonly used as an attachment in spam.<\/em><\/p>\n<p><a href=\"https:\/\/www.helpnetsecurity.com\/2020\/04\/08\/exploit-cve-2020-0688\/\"><strong>Actively Exploited MS Exchange Flaw Present on 80% of Exposed Servers<\/strong><\/a><\/p>\n<p><em>Attackers looking to exploit CVE-2020-0688, a critical Microsoft Exchange flaw&nbsp;patched&nbsp;by Microsoft in February 2020, don\u2019t have to look hard to find a server they can attack: according to an internet-wide scan performed by Rapid7 researchers, there are at least 315,000 and possibly as many as 350,000 vulnerable on-premise Exchange servers (out of 433,464 total) out there.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/virtualization-and-cloud\/misconfigured-docker-daemon-api-ports-attacked-for-kinsing-malware-campaign\"><strong>Misconfigured Docker Daemon API Ports Attacked for Kinsing Malware Campaign<\/strong><\/a><\/p>\n<p><em>A campaign that targets misconfigured Docker Daemon API ports through Kinsing malware was reported by security researchers from Aqua Security. The campaign exploited the ports to run an Ubuntu container. According to the researchers, Kinsing malware\u2019s strings revealed that it is a Golang-based Linux agent.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/threat-actors-deliver-courier-themed-spam-campaign-with-attached-ace-files\"><strong>Threat Actors Deliver Courier-Themed Spam Campaign with Attached ACE Files<\/strong><\/a><\/p>\n<p><em>Trend Micro researchers detected a new courier service-themed malicious spam campaign that uses ACE files as attachments. The samples were gathered from Trend Micro\u2019s honeypot. The email poses as a shipment arrival notification with a fake receipt attached. It then convinces receivers to download the attachment by asking them to check if the address on the receipt is correct.blo<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/virtualization-and-cloud\/exploring-common-threats-to-cloud-security\"><strong>Exploring Common Threats to Cloud Security<\/strong><\/a><\/p>\n<p><em>Trend Micro\u2019s recent cloud research provides examples of threats and risks organizations could face when migrating to the cloud or using cloud services. No matter the cloud service or platform, the common theme is that misconfiguration continues to be one of the major pitfalls of cloud security, affecting both companies who subscribe to cloud services and users of software that are hosted on the cloud.<\/em><\/p>\n<p><a href=\"https:\/\/threatpost.com\/powerpoint-weakness-mouse-over-attack\/154589\/\"><strong>PowerPoint \u2018Weakness\u2019 Opens Door to Malicious Mouse-Over Attack<\/strong><\/a><\/p>\n<p><em>A researcher is sounding the alarm over what he believes could be a novel attack vector which allows a hacker to manipulate a PowerPoint file to download and begin the installation of malware, simply by hovering over a hypertext link. The technique does require a victim to accept one pop-up dialogue box to run or install a program. For those reasons, Microsoft does not consider this a vulnerability.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/cloud-transformation-is-the-biggest-opportunity-to-fix-security\/\"><strong>Cloud Transformation Is the Biggest Opportunity to Fix Security<\/strong><\/a><\/p>\n<p><em>Lower costs, improved efficiencies and faster time to market are some of the primary benefits of transitioning to the cloud. However, it\u2019s not done overnight. It can take years to move complete data centers and operational applications to the cloud and the benefits won\u2019t be fully realized until most functional data have been transitioned.<\/em><\/p>\n<p><a href=\"https:\/\/www.cyberscoop.com\/world-wired-labs-winnti-netwire-china-blackberry-cylance\/\"><strong>Who is World Wired Labs and Why Are They Selling an Android Trojan?<\/strong><\/a><\/p>\n<p><em>A company advertising a remote access tool frequently used by criminals and nation-state hackers may be serving as a front for a Chinese hacking group, according to research published by BlackBerry Cylance. In a&nbsp;report on&nbsp;remote access trojans&nbsp;(RAT), researchers detail an Android malware variant, which they call PWNDROID4, that can be used to monitor targets\u2019 phone calls, record audio, send and receive text messages, and track victims\u2019 GPS location.<\/em><\/p>\n<p>Is your organization looking to migrate to the cloud? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about why Zoom has released an update for its Linux, Mac, and Windows apps that removes the meeting ID from the app&#8217;s title bar. Also, read&#8230;<br \/>\nThe post This Week in Security News: Exploring Common Threats to Cloud Security and Zoom Removes Meeting IDs from App Title Bar to Improve Privacy appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34337,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[311,307,8301],"class_list":["post-34336","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-current-news","tag-security","tag-this-week-in-security-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>This Week in Security News: Exploring Common Threats to Cloud Security and Zoom Removes Meeting IDs from App Title Bar to Improve Privacy 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This Week in Security News: Exploring Common Threats to Cloud Security and Zoom Removes Meeting IDs from App Title Bar to Improve Privacy 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-10T12:46:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"This Week in Security News: Exploring Common Threats to Cloud Security and Zoom Removes Meeting IDs from App Title Bar to Improve Privacy\",\"datePublished\":\"2020-04-10T12:46:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/\"},\"wordCount\":1191,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy.jpg\",\"keywords\":[\"Current News\",\"Security\",\"This week in security news\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/\",\"name\":\"This Week in Security News: Exploring Common Threats to Cloud Security and Zoom Removes Meeting IDs from App Title Bar to Improve Privacy 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy.jpg\",\"datePublished\":\"2020-04-10T12:46:43+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy.jpg\",\"width\":300,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Current News\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/current-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"This Week in Security News: Exploring Common Threats to Cloud Security and Zoom Removes Meeting IDs from App Title Bar to Improve Privacy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This Week in Security News: Exploring Common Threats to Cloud Security and Zoom Removes Meeting IDs from App Title Bar to Improve Privacy 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/","og_locale":"en_US","og_type":"article","og_title":"This Week in Security News: Exploring Common Threats to Cloud Security and Zoom Removes Meeting IDs from App Title Bar to Improve Privacy 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-10T12:46:43+00:00","og_image":[{"width":300,"height":300,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"This Week in Security News: Exploring Common Threats to Cloud Security and Zoom Removes Meeting IDs from App Title Bar to Improve Privacy","datePublished":"2020-04-10T12:46:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/"},"wordCount":1191,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy.jpg","keywords":["Current News","Security","This week in security news"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/","url":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/","name":"This Week in Security News: Exploring Common Threats to Cloud Security and Zoom Removes Meeting IDs from App Title Bar to Improve Privacy 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy.jpg","datePublished":"2020-04-10T12:46:43+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy.jpg","width":300,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/this-week-in-security-news-exploring-common-threats-to-cloud-security-and-zoom-removes-meeting-ids-from-app-title-bar-to-improve-privacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Current News","item":"https:\/\/www.threatshub.org\/blog\/tag\/current-news\/"},{"@type":"ListItem","position":3,"name":"This Week in Security News: Exploring Common Threats to Cloud Security and Zoom Removes Meeting IDs from App Title Bar to Improve Privacy"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34336"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34336\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34337"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}