Zoom has an actively exploited vulnerability.
Zoom is a “remote conferencing services company headquartered in San Jose, California. It provides a remote conferencing service that combines video conferencing, online meetings, chat, and mobile collaboration”
The problem starts when you chat with other meeting attendees and in particular when you sent them a link. If the link you shared happens to be a a UNC path such as \\servername\share\1.exe this gets converted to a hyper link whereby when you click on it this will open in your default browser. By doing so something strange ensues.
For more details see here and for an in-depth analysis and demonstration screen captures see are here.
Most importantly you need to follow the company’s recommendations.