AUMINT.io Blog

 

Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources

The Psychology of Phishing: Why We Fall For It

Phishing attacks, those deceptive emails or messages designed to steal your personal information, are a constant threat.But why do they work?It's not just about technology; it's about understanding the psychology behind these scams. Let's analyse the leverages that...

Five major cyberattacks of 2024

The number of cyberattacks has increased in recent years. Between April 2023 and March 2024, there was an 81% increase, and the types of companies now being targeted aren’t just major corporations. Cybercriminals are going after smaller ones too. They’re also...

A major ransomware attack on the NHS

Earlier in June, Synnovis, a pathology services provider to several of London’s NHS Trust hospitals was the victim of double extortion ransomware. According to one healthcare cybersecurity expert, “this is probably one of the most significant cyberattacks on the NHS”...

Hacktivists: what are they and why should you care?

Hacktivists are generally known to carry out cyberattacks for, what they perceive to be, the greater good of society. They’re a bit like the Robin Hoods of the internet. However, in recent years, the nature of hacktivism has changed and as such is potentially becoming...

How to choose a strong password

We’ve all been guilty of using weak passwords, or of using the same one for all our accounts - it's easier to remember. For some of you, this may still be the case. But doing this can make you vulnerable to attackers. More than 60% of internet users admit to using the...

Recent Bite-Size Posts

Scammers don’t take summer holidays

Summer is when most people think about taking holidays and enjoying outdoor activities to make the most of good weather. But cyber criminals don’t take a break during this period. They have scams specifically for this season. Here are three to look out for: 1. Fake...

Why does fake news go viral so quickly?

Fake news is nothing new but, since the rise of social media, it’s become more prolific and spreads faster. In fact, fake news stories are 70% more likely to spread than real news. Why is that? Fake news travels faster than true news Numerous recent studies have shown...

Is your personal data being sold on the dark web?

Data breaches, including large scale ones where company databases are hacked, are not uncommon. There have been at least four in 2022 alone, leaking the records of more than 8m people. That means your personal details could be out there for scammers to exploit. Why do...

5 ways AI is being used by scammers

Artificial Intelligence (AI) has many benefits. It can help us do our work - especially boring, repetitive tasks - more quickly and efficiently. But, it also helps scammers do their work better too. Here are five ways that hackers are using AI. 1. Bypassing CAPTCHAs...

A new WhatsApp scam enables account hijacking

A new WhatsApp OTP (one-time password) hack has just been identified in India which enables scammers to takeover users’ accounts via a phone call. Whilst scams targeting WhatsApp are nothing new, this one takes advantage of external call forwarding services.  How does...

Why “liveness tests” can be vulnerable to attack

To prevent fraud, companies are looking at increasingly sophisticated methods to verify customers’ identities. “Liveness tests” are one way of doing this, but it seems that even these are vulnerable to attack.  What are “liveness tests”? “Liveness tests” are used by...

5 ransomware trends to look out for 

Ransomware attacks are on the rise. According to a report by AV-TEST, the amount of malware has reached a new high, with over 150m harmful programme variants identified. And the risk of stolen data being released due to ransomware attacks increased from 8.7 percent in...

The growing trend of current event-based phishing hacks

You might think you can spot a phishing email a mile off. But gone are the days of “Nigerian princes” asking you to wire them money. Hackers have become more sophisticated in their techniques. Their new tactics are clearly working as, according to CISCO’s 2021...

What’s warshipping and why should you be aware of it?

You might not consider warshipping - malicious hardware sent by post - when planning your cybersecurity strategy. After all, it uses one of the oldest methods of delivery available. Yet, it can pose a real threat to your network if successful.  Warshipping is on the...

Mobile payment app scams: 5 ways to avoid them

Mobile payment apps have made sending money easier, but they have also created a new opportunity for scammers.  One phishing scam that US authorities warn about involves the app Zelle - owned by a consortium of major banks including Bank of America, Chase,...

4 cybercrime trends to be aware of in 2022

Whilst any cyber attack is unpredictable, there are trends that hackers follow. Here are some of the main ones to be aware of in 2022.  1. Current event-based phishing attacks Phishing is not a new tactic, however attacks are becoming increasingly sophisticated....

How to protect yourself against revenge attacks

Imagine an ex-employee, who was fired by your company, takes revenge by hacking into your IT system. They’re able to do this because passwords of systems they had access to have not been changed. Within a few hours they could potentially do significant damage to your...

See how the Hacker sees you

Get your FREE Exposure Report NOW
Get the report