AUMINT.io Blog

 

Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources

The Psychology of Phishing: Why We Fall For It

Phishing attacks, those deceptive emails or messages designed to steal your personal information, are a constant threat.But why do they work?It's not just about technology; it's about understanding the psychology behind these scams. Let's analyse the leverages that...

Five major cyberattacks of 2024

The number of cyberattacks has increased in recent years. Between April 2023 and March 2024, there was an 81% increase, and the types of companies now being targeted aren’t just major corporations. Cybercriminals are going after smaller ones too. They’re also...

A major ransomware attack on the NHS

Earlier in June, Synnovis, a pathology services provider to several of London’s NHS Trust hospitals was the victim of double extortion ransomware. According to one healthcare cybersecurity expert, “this is probably one of the most significant cyberattacks on the NHS”...

Hacktivists: what are they and why should you care?

Hacktivists are generally known to carry out cyberattacks for, what they perceive to be, the greater good of society. They’re a bit like the Robin Hoods of the internet. However, in recent years, the nature of hacktivism has changed and as such is potentially becoming...

How to choose a strong password

We’ve all been guilty of using weak passwords, or of using the same one for all our accounts - it's easier to remember. For some of you, this may still be the case. But doing this can make you vulnerable to attackers. More than 60% of internet users admit to using the...

Recent Bite-Size Posts

HACKERS LOVE A BARGAIN

Why Hackers love bargin events and how to be protected?   Hackers love a bargain just as much as consumers do and the run up to Amazon Prime Day is a perfect opportunity to swindle. The hackers often use Scam Websites and Phishing campaigns to take advantage of...

What is Whaling and how to avoid it?

* This article is part of a sequel on Social Engineering Attack Types and how to avoid them. You can read our previous article about spear phishing, here:  (https://web.aumint.io/spearphishing-spear-phishing/). Whaling is a sophisticated and specifically targeted...

Spear Phishing

Perhaps you remember hearing about people getting requests from a Nigerian prince, a scam known as Phishing? Hackers spread wide nets, playing the numbers and hoping to take advantage of people's naivete and generosity. Today's hackers are far more sophisticated and...

Warshipping attack – free books for all

What is Warshipping ?Warshipping uses disposable, low-cost, low-power computers to remotely perform close-proximity attacks, regardless of the hacker’s location. The attacker can control the device from the comfort of their home anywhere in the world. The only thing...

US 2020 Less Data Breaches but More Expensive

United States Reported Less Data Breaches in 2020 but with much more Expensive Successful Hacker Attacks   According to the annual report of the Identity Theft Resource Center (ITRC), 1,108 cyber incidents were reported in 2020 and the number casualties from...

Nefilim Hackers used deceased employee email

In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system. Nefilim Ransomware Attack...

What is Exposure Report

The Report is Representing Organization's Social Engineering Exposure Level It is unique for each Organization. As it is provided after analyzing organization's operation and its cyber awareness. The Cyber Exposure Score is the average of all the Asset Exposure Scores...

See how the Hacker sees you

Get your FREE Exposure Report NOW
Get the report