I agree with your sentiment, though Zoom should take the blame here.
The difference with e.g. Micros~1 vulnerabilities is that Zoom has deliberately chosen a poor encryption cipher for no obvious reason. AES-GCM (amongst others) was available when Zoom corp. was formed decade ago, yet they chose a specific AES cipher not fit for streaming video - amongst many other security snafus recently reported - falsely claiming end-to-end encryption, data-mining with Facebook etc.
This would be somewhat understandable if this was a small start-up that had its v0.9 product suddenly found out by the masses, but it's a billion-dollar software company with thousands of employees, and it hasn't (apparently) had any consideration for security until recently.
Had these exposes not happened, several companies, people (including Boris) would still happily be divulging their secrets, handily routed through China.