OhadPlotnik Profile Banner
Ohad Plotnik Profile
Ohad Plotnik

@OhadPlotnik

Followers
274
Following
3K
Media
10
Statuses
147

I am a tech entrepreneur and investor. Co-founder of Aorato (Aquired by Microsoft) now - the Co-founder and GM of @AirEyeSecurity

Israel
Joined March 2015
Don't wanna be here? Send us removal request.
@wunderwuzzi23
Johann Rehberger
3 months
šŸ‘‰ Episode 4: Cursor IDE Arbitrary Data Exfiltration via Mermaid (CVE-2025-54132) šŸ“ā€ā˜ ļø
1
10
53
@OhadPlotnik
Ohad Plotnik
7 months
This guide explores: āœ… Emerging antenna-for-hire threats āœ… Remote rogue AP deployments āœ… OT, IoT, and physical airspace risks you won’t see in traditional network maps Thanks to @vanhoefm for inspiring the @AirEyeSecurity team to work on that threat modelling.
0
0
1
@OhadPlotnik
Ohad Plotnik
7 months
🚨 The AirEye research team has just published our 2025 Wireless Airspace Threat Modeling guide. In an era where any Wi-Fi attack can now be a remote attack, understanding and securing your wireless airspace has never been more critical. https://t.co/T9O2tDAr0D
aireye.tech
Threat Modeling the Wireless Airspace in 2025 Research
1
0
2
@Volexity
Volexity
1 year
.@Volexity’s latest blog post describes in detail how a Russian APT used a new attack technique, the ā€œNearest Neighbor Attackā€, to leverage Wi-Fi networks in close proximity to the intended target, while the attacker was halfway around the world. https://t.co/R3aKyrjVYR #dfir
Tweet card summary image
volexity.com
In early February 2022, notably just ahead of the Russian invasion of Ukraine, Volexity made a discovery that led to one of the most fascinating and complex incident investigations Volexity had ever...
7
176
383
@TalBeerySec
Tal Be'ery
1 year
1/Hack thy neighbor!🧵 There is a bigger lesson here: We often dismiss (e.g. lower CVSS) attack vectors that require proximity. However, in many cases the required attack stimulus can be generated via a hacked nearby system, making it remote! CC:@thegrugq @RGB_Lights @ImposeCost
@Volexity
Volexity
1 year
.@Volexity’s latest blog post describes in detail how a Russian APT used a new attack technique, the ā€œNearest Neighbor Attackā€, to leverage Wi-Fi networks in close proximity to the intended target, while the attacker was halfway around the world. https://t.co/R3aKyrjVYR #dfir
1
3
6
@vanhoefm
Mathy Vanhoef
1 year
Wow, an adversary first compromised a neighbor of the target, and then attacked the target over Wi-Fi (with stolen password). This is the first observed case of the #AntennaForHire attack that @AirEyeSecurity hypothesized. Remember: any Wi-Fi attack can now be a remote attack
@Volexity
Volexity
1 year
.@Volexity’s latest blog post describes in detail how a Russian APT used a new attack technique, the ā€œNearest Neighbor Attackā€, to leverage Wi-Fi networks in close proximity to the intended target, while the attacker was halfway around the world. https://t.co/R3aKyrjVYR #dfir
0
5
24
@OhadPlotnik
Ohad Plotnik
11 months
For all of the #cybersecurity guys out there, do you agree?
0
0
0
@OhadPlotnik
Ohad Plotnik
3 years
4
0
1
@OhadPlotnik
Ohad Plotnik
4 years
1/2 Recently passengers of a flight from Israel to Turkey received on their mobile phones pictures of airplane crashes, causing fright and leading the pilot to return to the terminal. While the offenders in the airplane case were on the airplane, it’s important to note that...
1
2
7
@OhadPlotnik
Ohad Plotnik
4 years
We like it secured. #nacp #aireye @AirEyeSecurity
0
0
1
@OhadPlotnik
Ohad Plotnik
4 years
and links to the AirEye blog explaining how we can help to protect the organization's network airspace. #cybersecurity #security #hacking #cyberdefense #securityawareness #cyberwarfare #cyberattack #phishing
0
0
0
@OhadPlotnik
Ohad Plotnik
4 years
Thanks to @nytimes for publishing this article describing the @NSACyber and @POTUS administration's warnings on Wi-Fi security. Our CTO, @amichaishulman was quoted on today's Wi-Fi vulnerabilities. https://t.co/K7gHK8mTDv
nytimes.com
The National Security Agency warned government employees that hackers could take advantage of the public Wi-Fi in coffee shops, airports and hotel rooms.
1
1
2
@amichaishulman
Amichai Shulman
4 years
Where there’s smoke there’s fire. When I assessed the Apple SSID vulnerability almost a month ago, I warned that it could possibly be used for more than just a prank. Our amazing colleagues from ZecOps just proved that it can be used for Remote Code Execution!!
1
2
10
@OhadPlotnik
Ohad Plotnik
4 years
Forbes describes the latest finding of our CTO, @amichaishulman , iOS and macOS security WiFi Vulnerabilities that can have an impact on your network and device security. https://t.co/sWkx7WQHS2
0
0
2
@OhadPlotnik
Ohad Plotnik
4 years
"Network Monitoring and Visibility Isn’t Enough" - great words by @Barikapace from @Gartner_inc. @AirEyeSecurity is mentioned under "Must Have Security – Prevent & Predict" "Plan On Your Road To Securing Critical Infrastructure & Beyond" https://t.co/k6b3eVfk7W
0
0
2
@amichaishulman
Amichai Shulman
4 years
@vm_call Although this latest iPhone Format String flaw is perceived as seemingly benign, the implications of this vulnerability stretch far and beyond any joking matter. More insights in my blog post
0
5
13
@OhadPlotnik
Ohad Plotnik
4 years
Thanks to @AirEyeSecurity CTO - @amichaishulman who shed some light about #Amazon #Sidewalk and its's impact on corporate security. Read more here: https://t.co/S4KuEBaiQr
0
0
1
@OhadPlotnik
Ohad Plotnik
4 years
Are you an IR professional? Time to hear your take! Is Wi-Fi an overlooked aspect in incidents or just someone's anecdotal battle story? Take the survey now! 5 mins, max. 8 simple questions. https://t.co/KVIsKfetpn
Tweet card summary image
docs.google.com
Share your Incident Response experience and learn from others! And the pressing issue of today's survey: Is Wi-Fi is an overlooked aspect in incidents or just someone's anecdotal battle story? Please...
0
0
0
@AirEyeSecurity
AirEye
4 years
Are you an IR professional? Time to hear your take! Is Wi-Fi an overlooked aspect in incidents or just someone's anecdotal battle story? Take the survey now! 5 mins, max. 8 simple questions. https://t.co/zIN3YDb5Ft
Tweet card summary image
docs.google.com
Share your Incident Response experience and learn from others! And the pressing issue of today's survey: Is Wi-Fi is an overlooked aspect in incidents or just someone's anecdotal battle story? Please...
0
1
1