by eran | 21 Jun 2021 | Academy, News
Why Hackers love bargin events and how to be protected? Hackers love a bargain just as much as consumers do and the run up to Amazon Prime Day is a perfect opportunity to swindle. The hackers often use Scam Websites and Phishing campaigns to take advantage of...
by eran | 21 May 2021 | Academy, Examples and Solutions
* This article is part of a sequel on Social Engineering Attack Types and how to avoid them. You can read our previous article about spear phishing, here: (https://web.aumint.io/spearphishing-spear-phishing/). Whaling is a sophisticated and specifically targeted...
by eran | 20 May 2021 | Academy, Examples and Solutions
Perhaps you remember hearing about people getting requests from a Nigerian prince, a scam known as Phishing? Hackers spread wide nets, playing the numbers and hoping to take advantage of people’s naivete and generosity. Today’s hackers are far more...
by eran | 26 Apr 2021 | Academy, Examples and Solutions
What is a IDN Homograph Attack? IDN (Internationalized Domain Name) Homograph Attack is a manipulative and simple, but sophisticated type of cyber attack. It is also called a “UTF8 URL Impersonation”. How does it work? A hacker poses as a trusted...
by Freddy Morris | 22 Jan 2021 | Academy
The Report is Representing Organization’s Social Engineering Exposure Level It is unique for each Organization. As it is provided after analyzing organization’s operation and its cyber awareness. The Cyber Exposure Score is the average of all the Asset...