The seller likely obtained the Zoom login credentials by exploiting past data breaches, which contain email addresses alongside previously used passwords, according to security firm Cyble.
The seller likely obtained the Zoom login credentials by exploiting past data breaches, which contain email addresses alongside previously used passwords, according to security firm Cyble.