Lotem Finkelsteen stories
![Story image](../../../../../uploads/story/2021/03/16/preview_GettyImages-473158924__4_.webp)
Exploits double 'every two to three hours' following Microsoft Exchange zero-days
Tue, 16th Mar 2021
#
cybersecurity
#
microsoft
#
check point software
Hackers are racing against security experts following the disclosure of vulnerabilities on Microsoft Exchange Servers, says Check Point Research.
![Story image](../../../../../uploads/story/2021/01/27/preview_GettyImages-509032879__2_.webp)
Thousands of stolen credentials end up on the internet by careless phishing scammers
Wed, 27th Jan 2021
#
phishing
#
email security
#
iam
Large-scale phishing campaign exposed stolen credentials to the public, Check Point Research and Otorio researchers find.
![Story image](../../../../../uploads/story/2020/11/23/preview_GettyImages-509032879__1_.webp)
Voice phishing attacks on the rise, remote workers vulnerable
Mon, 23rd Nov 2020
#
phishing
#
email security
#
hybrid & remote work
Increase in voice phishing attacks targeting remote workforces, using employees' names to trick victims into sharing login credentials and data.
![Story image](../../../../../uploads/story/2020/08/10/preview_GettyImages-509032879.webp)
Google and Amazon overtake Apple as most imitated brands - Check Point
Mon, 10th Aug 2020
#
phishing
#
email security
#
personal computing devices
Google and Amazon were the most imitated brands in phishing attempts for the second quarter of 2020, according to Check Point.
![Story image](../../../../../uploads/story/2020/05/08/preview_GettyImages-1169729390.webp)
Check Point uncovers five year cyber espionage campaign
Fri, 8th May 2020
#
email security
#
government
#
cyber espionage
Naikon’s primary method is exploit the trust and diplomatic relations between departments and governments to increase the chances of its attack succeeding.