Ohad Plotnik
@OhadPlotnik
Followers
274
Following
3K
Media
10
Statuses
147
I am a tech entrepreneur and investor. Co-founder of Aorato (Aquired by Microsoft) now - the Co-founder and GM of @AirEyeSecurity
Israel
Joined March 2015
š Episode 4: Cursor IDE Arbitrary Data Exfiltration via Mermaid (CVE-2025-54132) š“āā ļø
1
10
53
This guide explores: ā
Emerging antenna-for-hire threats ā
Remote rogue AP deployments ā
OT, IoT, and physical airspace risks you wonāt see in traditional network maps Thanks to @vanhoefm for inspiring the @AirEyeSecurity team to work on that threat modelling.
0
0
1
šØ The AirEye research team has just published our 2025 Wireless Airspace Threat Modeling guide. In an era where any Wi-Fi attack can now be a remote attack, understanding and securing your wireless airspace has never been more critical. https://t.co/T9O2tDAr0D
aireye.tech
Threat Modeling the Wireless Airspace in 2025 Research
1
0
2
.@Volexityās latest blog post describes in detail how a Russian APT used a new attack technique, the āNearest Neighbor Attackā, to leverage Wi-Fi networks in close proximity to the intended target, while the attacker was halfway around the world. https://t.co/R3aKyrjVYR
#dfir
volexity.com
In early February 2022, notably just ahead of the Russian invasion of Ukraine, Volexity made a discovery that led to one of the most fascinating and complex incident investigations Volexity had ever...
7
176
383
1/Hack thy neighbor!š§µ There is a bigger lesson here: We often dismiss (e.g. lower CVSS) attack vectors that require proximity. However, in many cases the required attack stimulus can be generated via a hacked nearby system, making it remote! CC:@thegrugq @RGB_Lights @ImposeCost
.@Volexityās latest blog post describes in detail how a Russian APT used a new attack technique, the āNearest Neighbor Attackā, to leverage Wi-Fi networks in close proximity to the intended target, while the attacker was halfway around the world. https://t.co/R3aKyrjVYR
#dfir
1
3
6
Wow, an adversary first compromised a neighbor of the target, and then attacked the target over Wi-Fi (with stolen password). This is the first observed case of the #AntennaForHire attack that @AirEyeSecurity hypothesized. Remember: any Wi-Fi attack can now be a remote attack
.@Volexityās latest blog post describes in detail how a Russian APT used a new attack technique, the āNearest Neighbor Attackā, to leverage Wi-Fi networks in close proximity to the intended target, while the attacker was halfway around the world. https://t.co/R3aKyrjVYR
#dfir
0
5
24
2/2 OTA attacks can be exploited remotely ā without actually physically being in the network airspace. Here's how: https://t.co/FV1qCzyz66
#NACP #cybercrime #cyberattack #networksecurity
aireye.tech
The offending passengers utilized Appleās feature, AirDrop, to send the files. The AirDrop protocol enables two devices to directly communicate without needing a pure Wi-Fi connection or Internet...
0
0
3
1/2 Recently passengers of a flight from Israel to Turkey received on their mobile phones pictures of airplane crashes, causing fright and leading the pilot to return to the terminal. While the offenders in the airplane case were on the airplane, itās important to note that...
1
2
7
and links to the AirEye blog explaining how we can help to protect the organization's network airspace. #cybersecurity #security #hacking #cyberdefense #securityawareness #cyberwarfare #cyberattack #phishing
0
0
0
Thanks to @nytimes for publishing this article describing the @NSACyber and @POTUS administration's warnings on Wi-Fi security. Our CTO, @amichaishulman was quoted on today's Wi-Fi vulnerabilities. https://t.co/K7gHK8mTDv
nytimes.com
The National Security Agency warned government employees that hackers could take advantage of the public Wi-Fi in coffee shops, airports and hotel rooms.
1
1
2
Where thereās smoke thereās fire. When I assessed the Apple SSID vulnerability almost a month ago, I warned that it could possibly be used for more than just a prank. Our amazing colleagues from ZecOps just proved that it can be used for Remote Code Execution!!
1
2
10
Forbes describes the latest finding of our CTO, @amichaishulman , iOS and macOS security WiFi Vulnerabilities that can have an impact on your network and device security. https://t.co/sWkx7WQHS2
0
0
2
"Network Monitoring and Visibility Isnāt Enough" - great words by @Barikapace from @Gartner_inc. @AirEyeSecurity is mentioned under "Must Have Security ā Prevent & Predict" "Plan On Your Road To Securing Critical Infrastructure & Beyond" https://t.co/k6b3eVfk7W
0
0
2
@vm_call Although this latest iPhone Format String flaw is perceived as seemingly benign, the implications of this vulnerability stretch far and beyond any joking matter. More insights in my blog post
0
5
13
Thanks to @AirEyeSecurity CTO - @amichaishulman who shed some light about #Amazon #Sidewalk and its's impact on corporate security. Read more here: https://t.co/S4KuEBaiQr
0
0
1
Are you an IR professional? Time to hear your take! Is Wi-Fi an overlooked aspect in incidents or just someone's anecdotal battle story? Take the survey now! 5 mins, max. 8 simple questions. https://t.co/KVIsKfetpn
docs.google.com
Share your Incident Response experience and learn from others! And the pressing issue of today's survey: Is Wi-Fi is an overlooked aspect in incidents or just someone's anecdotal battle story? Please...
0
0
0
Are you an IR professional? Time to hear your take! Is Wi-Fi an overlooked aspect in incidents or just someone's anecdotal battle story? Take the survey now! 5 mins, max. 8 simple questions. https://t.co/zIN3YDb5Ft
docs.google.com
Share your Incident Response experience and learn from others! And the pressing issue of today's survey: Is Wi-Fi is an overlooked aspect in incidents or just someone's anecdotal battle story? Please...
0
1
1