Privacy controls
CyberFurl can load analytics only after you opt in. Core product features work without analytics consent.
CyberFurl completed this security preview for zoom.us. DNS posture is strongest right now, while Email authenticity needs the most attention.
Unified external risk score across DNS, email, web, malware, breach exposure, and technical readiness signals.
Based on CyberFurl's latest external security audit, zoom.us has a security score of 69/100 (Grade D). This score is calculated across DNS configuration, email authentication (SPF, DKIM, DMARC), SSL/TLS certificates, web security headers, malware signals, and breach exposure data. The scan identified 3 issues that need attention.
A score of 69/100 indicates security gaps that need attention. zoom.us has some controls in place but significant improvements are recommended.
CyberFurl checks the public email authentication records for zoom.us including SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance). These protocols determine whether emails from zoom.us can be trusted by receiving mail servers and whether they are likely to reach the inbox or be flagged as spam.
A public summary of the checks that surfaced the strongest visible signals in this report.
Get the full remediation workbook with step-by-step fixes delivered to your inbox.
DNS posture is currently the strongest area for zoom.us at 93/A, while Email authenticity needs the most attention at 73/C. Priority issues include DNS settings need attention and DKIM signing and key strength. Email the report to get the full narrative and prioritized fix list.
Email the full report for the business summary, supporting context, and prioritized actions.
One primary exposure, one strongest control, and the remaining stages arranged as report rows instead of equal-weight dashboard tiles.
DNS settings need attention
Saved signals that support the scored audit without introducing another score layer.
These deeper checks are already part of the audit model and unlock in the emailed report or full workspace.
Expanded surface validation, exposure review, and deeper internet-facing checks.
External threat feeds, blacklist references, and malware heuristics.
Public-source incident monitoring is included. Private credential-corpus and employee-exposure intelligence expand on paid plans.
Surface readiness for public-infrastructure controls across common frameworks.
Short answers that explain how to interpret the public findings on this report page.
Compare this report to similar domains, jump back to the report index, or open the glossary and free tools referenced by the findings.
Enter your work email to receive the full, shareable PDF report for zoom.us. Includes the executive summary, expanded findings, and a step-by-step remediation workbook.