Company Details
zoom-video-communications
10,882
558,418
5415
zoom.us
0
ZOO_1106018
In-progress

Zoom Company CyberSecurity Posture
zoom.usBring teams together, reimagine workspaces, engage new audiences, and delight your customers –– all on the Zoom platform you know and love. 💙 Zoomies help people stay connected so they can get more done together. We set out on a mission to make video communications frictionless and secure by building the world’s best video product for the enterprise, but we didn’t stop there. With products like AI Companion, Team Chat, Contact Center, Phone, Events, Rooms, Webinar, and more, we bring innovation to a wide variety of customers, from the conference room to the classroom, from doctor’s offices to financial institutions to government agencies, from global brands to small businesses. We do what we do because of our core value of Care: care for our community, our customers, our company, our teammates, and ourselves. Our global employees help our customers meet happier, communicate better, and create meaningful connections the world over. Zoomies are problem-solvers and self-starters, working hard to get results and moving quickly to design solutions with our customers and users in mind. Here, you’ll work across teams to dig deep into impactful projects that are changing the way people communicate, and find room to grow with opportunities to stretch your skills and advance your career in a diverse, inclusive environment. Learn more about careers at Zoom by visiting our careers site: https://careers.zoom.us/home
Company Details
zoom-video-communications
10,882
558,418
5415
zoom.us
0
ZOO_1106018
In-progress
Between 750 and 799

Zoom Global Score (TPRM)XXXX

Description: Zoom accounts became a victim of cyberattack. Over 500,000 Zoom accounts are being sold on the dark web. These credentials were gathered through credential stuffing attacks where threat actors attempt to log in to Zoom using accounts leaked in older data breaches. The purchased accounts include a victim's email address, password, personal meeting URL, and their HostKey.
Description: Zoom released updates for vulnerabilities across various platforms, including the most severe cross-site scripting flaw which could compromise user data integrity. The vulnerabilities, with medium to low CVSS scores, could be exploited to inject malicious scripts or cause denial of service. Zoom addressed the issues in their latest updates for an extensive range of applications including desktop, mobile, VDI clients, Zoom Rooms, and the Meeting SDK.


Zoom has 38.89% more incidents than the average of same-industry companies with at least one recorded incident.
Zoom has 29.87% more incidents than the average of all companies with at least one recorded incident.
Zoom reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Zoom cyber incidents detection timeline including parent company and subsidiaries

Bring teams together, reimagine workspaces, engage new audiences, and delight your customers –– all on the Zoom platform you know and love. 💙 Zoomies help people stay connected so they can get more done together. We set out on a mission to make video communications frictionless and secure by building the world’s best video product for the enterprise, but we didn’t stop there. With products like AI Companion, Team Chat, Contact Center, Phone, Events, Rooms, Webinar, and more, we bring innovation to a wide variety of customers, from the conference room to the classroom, from doctor’s offices to financial institutions to government agencies, from global brands to small businesses. We do what we do because of our core value of Care: care for our community, our customers, our company, our teammates, and ourselves. Our global employees help our customers meet happier, communicate better, and create meaningful connections the world over. Zoomies are problem-solvers and self-starters, working hard to get results and moving quickly to design solutions with our customers and users in mind. Here, you’ll work across teams to dig deep into impactful projects that are changing the way people communicate, and find room to grow with opportunities to stretch your skills and advance your career in a diverse, inclusive environment. Learn more about careers at Zoom by visiting our careers site: https://careers.zoom.us/home


Akkodis is a global digital engineering company and Smart Industry leader. We enable clients to advance in their digital transformation with Talent, Academy, Consulting, and Solutions services. Our 50,000 experts combine best-in-class technologies, R&D, and deep sector know-how for purposeful innova

SoftServe is a premier IT consulting and digital services provider. We expand the horizon of new technologies to solve today's complex business challenges and achieve meaningful outcomes for our clients. Our boundless curiosity drives us to explore and reimagine the art of the possible. Clients conf
NEC Corporation has established itself as a leader in the integration of IT and network technologies while promoting the brand statement of “Orchestrating a brighter world.” NEC enables businesses and communities to adapt to rapid changes taking place in both society and the market as it provides fo
At Avaya, we give our customers the freedom to take their business in the directions that benefit them most. We provide the paths for both customers and their employees where every moment big and small can drive in the moment, memorable experiences. The journey is theirs at the pace that makes sense

At Orange Business, our ambition is to become the leading European Network and Digital Integrator by leveraging our proven expertise in next-generation connectivity solutions, the cloud and cybersecurity. Our 30,000 women and men are present in 65 countries, where every voice counts. Together, we

ASGN Incorporated (NYSE: ASGN) is a leading provider of IT services and solutions across the commercial and government sectors. ASGN helps corporate enterprises and government organizations develop, implement and operate critical IT and business solutions through its integrated offerings. For more i
For over 70 years, Iron Mountain Incorporated (NYSE: IRM) has been your strategic partner to care for your information and assets. A global leader in storage and information management services and trusted by more than 225,000 organizations around the world, including 95% of the Fortune 1000, we pro

Tata Elxsi is amongst the world’s leading providers of design and technology services across industries, including Automotive, Media & Entertainment, Communications, and Healthcare. Tata Elxsi is helping customers reimagine their products and services through design thinking and the application of d

eClerx is a productized services company, bringing together people, technology and domain expertise to amplify business results. Our mission is to set the benchmark for client service and success in our industry. Our vision is to be the innovation partner of choice for technology, data analytics and
.png)
Zoom has issued multiple security bulletins detailing patches for several vulnerabilities affecting its Workplace applications.
A new security vulnerability has been discovered in Zoom Workplace VDI Client for Windows that could allow attackers to escalate their...
A vulnerability discovered in Zoom Workplace VDI Client for Windows that allow attackers to gain elevated privileges on affected systems.
Cybersecurity researchers have disclosed details of a coordinated spear-phishing campaign dubbed PhantomCaptcha targeting organizations...
Apollo Micro Systems Forges Cybersecurity Alliances with Sibersentinel and Zoom Technologies ... Apollo Micro Systems Limited (AMSL) has signed...
Apollo Micro Systems Ties Up with Sibersentinel, Zoom for Cybersecurity Technologies. Published on 09/18/2025 at 06:03 am EDT. MT Newswires.
Zoom has released a security update addressing several flaws in its software, including Zoom Workplace and various Windows and macOS clients...
Zoom released a security update addressing multiple vulnerabilities in its software, including Zoom Workplace and various clients for...
Zoom has released an urgent security update for its Windows client and Workplace platform to address multiple flaws.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Zoom is https://www.zoom.us.
According to Rankiteo, Zoom’s AI-generated cybersecurity score is 765, reflecting their Fair security posture.
According to Rankiteo, Zoom currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Zoom is not certified under SOC 2 Type 1.
According to Rankiteo, Zoom does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Zoom is not listed as GDPR compliant.
According to Rankiteo, Zoom does not currently maintain PCI DSS compliance.
According to Rankiteo, Zoom is not compliant with HIPAA regulations.
According to Rankiteo,Zoom is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Zoom operates primarily in the IT Services and IT Consulting industry.
Zoom employs approximately 10,882 people worldwide.
Zoom presently has no subsidiaries across any sectors.
Zoom’s official LinkedIn profile has approximately 558,418 followers.
Zoom is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
Yes, Zoom has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/zoom-video-communications.
Yes, Zoom maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/zoom-video-communications.
As of December 11, 2025, Rankiteo reports that Zoom has experienced 2 cybersecurity incidents.
Zoom has an estimated 37,490 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability and Data Leak.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with released updates for various platforms..
Title: Zoom Accounts Data Breach
Description: Zoom accounts became a victim of cyberattack. Over 500,000 Zoom accounts are being sold on the dark web. These credentials were gathered through credential stuffing attacks where threat actors attempt to log in to Zoom using accounts leaked in older data breaches. The purchased accounts include a victim's email address, password, personal meeting URL, and their HostKey.
Type: Data Breach
Attack Vector: Credential Stuffing
Vulnerability Exploited: Reused credentials from older data breaches
Motivation: Financial gain by selling accounts on the dark web
Title: Zoom Cross-Site Scripting Vulnerability
Description: Zoom released updates for vulnerabilities across various platforms, including the most severe cross-site scripting flaw which could compromise user data integrity. The vulnerabilities, with medium to low CVSS scores, could be exploited to inject malicious scripts or cause denial of service. Zoom addressed the issues in their latest updates for an extensive range of applications including desktop, mobile, VDI clients, Zoom Rooms, and the Meeting SDK.
Type: Vulnerability
Attack Vector: Cross-Site Scripting (XSS)
Vulnerability Exploited: Cross-Site Scripting (XSS)
Motivation: Inject malicious scriptsCause denial of service
Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Data Compromised: Email address, Password, Personal meeting url, Hostkey

Data Compromised: User data integrity
Systems Affected: DesktopMobileVDI clientsZoom RoomsMeeting SDK
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Email Address, Password, Personal Meeting Url, Hostkey, and User data integrity.

Entity Name: Zoom
Entity Type: Company
Industry: Technology
Customers Affected: 500000

Remediation Measures: Released updates for various platforms

Type of Data Compromised: Email address, Password, Personal meeting url, Hostkey
Number of Records Exposed: 500000

Type of Data Compromised: User data integrity
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Released updates for various platforms.

Root Causes: Reused credentials from older data breaches

Corrective Actions: Released updates for various platforms
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Released updates for various platforms.
Most Significant Data Compromised: The most significant data compromised in an incident were Email address, Password, Personal meeting URL, HostKey, and User data integrity.
Most Significant System Affected: The most significant system affected in an incident was DesktopMobileVDI clientsZoom RoomsMeeting SDK.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Email address, User data integrity, Personal meeting URL, Password and HostKey.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 500.0.
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.