Lotem Finkelsteen stories
Lotem Finkelsteen writes extensively about cybersecurity threats and trends, shedding light on the evolving tactics used by cybercriminals. Readers can explore detailed accounts of various cyber attacks, including voice phishing campaigns targeting remote workers and espionage efforts exploiting trust within organizations.
The stories also cover the rapid development and exploitation of vulnerabilities in widely used software, offering insights into how hackers operate in real-time against security measures. By following these narratives, readers gain a better understanding of the cybersecurity landscape, the risks involved, and the importance of vigilance in protecting digital information.
Exploits double 'every two to three hours' following Microsoft Exchange zero-days
Tue, 16th Mar 2021
Hackers are racing against security experts following the disclosure of vulnerabilities on Microsoft Exchange Servers, says Check Point Research.
Thousands of stolen credentials end up on the internet by careless phishing scammers
Wed, 27th Jan 2021
Large-scale phishing campaign exposed stolen credentials to the public, Check Point Research and Otorio researchers find.
Voice phishing attacks on the rise, remote workers vulnerable
Mon, 23rd Nov 2020
Increase in voice phishing attacks targeting remote workforces, using employees' names to trick victims into sharing login credentials and data.
Google and Amazon overtake Apple as most imitated brands - Check Point
Mon, 10th Aug 2020
Google and Amazon were the most imitated brands in phishing attempts for the second quarter of 2020, according to Check Point.
Check Point uncovers five year cyber espionage campaign
Fri, 8th May 2020
Naikon’s primary method is exploit the trust and diplomatic relations between departments and governments to increase the chances of its attack succeeding.