AUMINT.io Blog
Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources
Recent Bite-Size Posts
HACKERS LOVE A BARGAIN
Why Hackers love bargin events and how to be protected? Hackers love a bargain just as much as consumers do and the run up to Amazon Prime Day is a perfect opportunity to swindle. The hackers often use Scam Websites and Phishing campaigns to take advantage of...
What is Whaling and how to avoid it?
* This article is part of a sequel on Social Engineering Attack Types and how to avoid them. You can read our previous article about spear phishing, here: (https://web.aumint.io/spearphishing-spear-phishing/). Whaling is a sophisticated and specifically targeted...
Spear Phishing
Perhaps you remember hearing about people getting requests from a Nigerian prince, a scam known as Phishing? Hackers spread wide nets, playing the numbers and hoping to take advantage of people's naivete and generosity. Today's hackers are far more sophisticated and...
IDN Homograph Attack aka UTF8 URL Impersonation
What is a IDN Homograph Attack? IDN (Internationalized Domain Name) Homograph Attack is a manipulative and simple, but sophisticated type of cyber attack. It is also called a "UTF8 URL Impersonation". How does it work? A hacker poses as a trusted counterpart...
Warshipping attack – free books for all
What is Warshipping ?Warshipping uses disposable, low-cost, low-power computers to remotely perform close-proximity attacks, regardless of the hacker’s location. The attacker can control the device from the comfort of their home anywhere in the world. The only thing...
OSIRIS Banking Trojan targets German IP Addresses
Method of infection: Water-holing OSIRIS used a Social Engineering method called "water holing" to attack German IP addresses. How does water holing attack work? The victim enters the infected website. The website checks if the target IP is...
Coveware’s Ransomware Attacks Report for Q4 2020
Coveware, which provides response services to ransomware attacks, has released a report for the fourth quarter of 2020. The 4 most interesting data from the report 1. The average ransom payment stands at $ 154,108 It is a decrease of 34% from the...
US 2020 Less Data Breaches but More Expensive
United States Reported Less Data Breaches in 2020 but with much more Expensive Successful Hacker Attacks According to the annual report of the Identity Theft Resource Center (ITRC), 1,108 cyber incidents were reported in 2020 and the number casualties from...
Nefilim Hackers used deceased employee email
In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system. Nefilim Ransomware Attack...
USCellular hit by a data breach after hackers access CRM software
Cellular communications operator USCellular announces that hackers have stolen customer information. According to the report, Hackers outwit some employees and get them to install malware on your office computer. The hackers managed to connect to the company computer...
What is Social Engineering and why should you care
What is Exposure Report
The Report is Representing Organization's Social Engineering Exposure Level It is unique for each Organization. As it is provided after analyzing organization's operation and its cyber awareness. The Cyber Exposure Score is the average of all the Asset Exposure Scores...