Lotem Finkelsteen stories
Exploits double 'every two to three hours' following Microsoft Exchange zero-days
Hackers are racing against security experts following the disclosure of vulnerabilities on Microsoft Exchange Servers, says Check Point Research.
Thousands of stolen credentials end up on the internet by careless phishing scammers
Large-scale phishing campaign exposed stolen credentials to the public, Check Point Research and Otorio researchers find.
Voice phishing attacks on the rise, remote workers vulnerable
Increase in voice phishing attacks targeting remote workforces, using employees' names to trick victims into sharing login credentials and data.
Google and Amazon overtake Apple as most imitated brands - Check Point
Google and Amazon were the most imitated brands in phishing attempts for the second quarter of 2020, according to Check Point.
Check Point uncovers five year cyber espionage campaign
Naikon’s primary method is exploit the trust and diplomatic relations between departments and governments to increase the chances of its attack succeeding.