AUMINT.io Blog

 

Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources

🚨Are we on the brink of a cyber-war?🚨

📢 What happened? An allegedly Chinese-sponsored hacker group carried out a sustained cyberattack (2021-2023) on the Belgian State Security Service (VSSE), stealing sensitive information.The hackers exploited a vulnerability in Microsoft Exchange servers...

Ghost Code: The Sinister Rise of Invisible Phishing with Unicode Obfuscation đź‘»

Imagine a digital world where malicious code can hide in plain sight, invisible to the human eye and security scanners. This isn't science fiction; it's the reality of a new and alarming phishing technique uncovered by Juniper Threat Labs. Researchers have exposed a...

The Psychology of Phishing: Why We Fall For It

Phishing attacks, those deceptive emails or messages designed to steal your personal information, are a constant threat.But why do they work?It's not just about technology; it's about understanding the psychology behind these scams. Let's analyse the leverages that...

Five major cyberattacks of 2024

The number of cyberattacks has increased in recent years. Between April 2023 and March 2024, there was an 81% increase, and the types of companies now being targeted aren’t just major corporations. Cybercriminals are going after smaller ones too. They’re also...

A major ransomware attack on the NHS

Earlier in June, Synnovis, a pathology services provider to several of London’s NHS Trust hospitals was the victim of double extortion ransomware. According to one healthcare cybersecurity expert, “this is probably one of the most significant cyberattacks on the NHS”...

Recent Bite-Size Posts

Don’t let remote working make you vulnerable

Business Email Compromise (BEC) is not new; however, fraudsters have changed their tactics in recent years. Rather than targeting C-suites and Executives, they’ve now cast their nets to the broader business ecosystem. And, the rise of home working has made their work...

Beware the deepfake con artists

Beware the deepfake con artists   From the fun Tom Cruise impersonation, to the more concerning fake Nancy Pelosi video, “deepfakes” have gained a lot of attention. But what are they and why could they be harmful to your business?   How are deepfakes made?...

HACKERS LOVE A BARGAIN

Why Hackers love bargin events and how to be protected?   Hackers love a bargain just as much as consumers do and the run up to Amazon Prime Day is a perfect opportunity to swindle. The hackers often use Scam Websites and Phishing campaigns to take advantage of...

What is Whaling and how to avoid it?

* This article is part of a sequel on Social Engineering Attack Types and how to avoid them. You can read our previous article about spear phishing, here:  (https://web.aumint.io/spearphishing-spear-phishing/). Whaling is a sophisticated and specifically targeted...

Spear Phishing

Perhaps you remember hearing about people getting requests from a Nigerian prince, a scam known as Phishing? Hackers spread wide nets, playing the numbers and hoping to take advantage of people's naivete and generosity. Today's hackers are far more sophisticated and...

Warshipping attack – free books for all

What is Warshipping ?Warshipping uses disposable, low-cost, low-power computers to remotely perform close-proximity attacks, regardless of the hacker’s location. The attacker can control the device from the comfort of their home anywhere in the world. The only thing...

US 2020 Less Data Breaches but More Expensive

United States Reported Less Data Breaches in 2020 but with much more Expensive Successful Hacker Attacks   According to the annual report of the Identity Theft Resource Center (ITRC), 1,108 cyber incidents were reported in 2020 and the number casualties from...

Nefilim Hackers used deceased employee email

In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system. Nefilim Ransomware Attack...

See how the Hacker sees you

Get your FREE Exposure Report NOW
Get the report