by eran | 21 May 2021 | Academy, Examples and Solutions
* This article is part of a sequel on Social Engineering Attack Types and how to avoid them. You can read our previous article about spear phishing, here: (https://web.aumint.io/spearphishing-spear-phishing/). Whaling is a sophisticated and specifically targeted...
by eran | 20 May 2021 | Academy, Examples and Solutions
Perhaps you remember hearing about people getting requests from a Nigerian prince, a scam known as Phishing? Hackers spread wide nets, playing the numbers and hoping to take advantage of people’s naivete and generosity. Today’s hackers are far more...
by eran | 26 Apr 2021 | Academy, Examples and Solutions
What is a IDN Homograph Attack? IDN (Internationalized Domain Name) Homograph Attack is a manipulative and simple, but sophisticated type of cyber attack. It is also called a “UTF8 URL Impersonation”. How does it work? A hacker poses as a trusted...
by eran | 9 Mar 2021 | Examples and Solutions
What is Warshipping ? Warshipping uses disposable, low-cost, low-power computers to remotely perform close-proximity attacks, regardless of the hacker’s location. The attacker can control the device from the comfort of their home anywhere in the world. The only thing...
by Freddy Morris | 9 Feb 2021 | Examples and Solutions, News
Method of infection: Water-holing OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses. How does water holing attack work? The victim enters the infected website. The website checks if the...
by Freddy Morris | 5 Feb 2021 | Examples and Solutions, News, Statistics
Coveware, which provides response services to ransomware attacks, has released a report for the fourth quarter of 2020. The 4 most interesting data from the report 1. The average ransom payment stands at $ 154,108 It is a decrease of 34% from the...