AUMINT.io Blog
Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources
Recent Bite-Size Posts
What is Social Engineering and why should you care
What is Exposure Report
The Report is Representing Organization's Social Engineering Exposure Level It is unique for each Organization. As it is provided after analyzing organization's operation and its cyber awareness. The Cyber Exposure Score is the average of all the Asset Exposure Scores...
CHwapi Hospital in Belgium Got Ransom Attacked
CHwapi Hospital in Belgium was attacked in a ransom attack, surgeries were postponed and patients were referred to other hospitals. The group of attackers, whose identities are unknown, reportedly encrypted about 80 servers and 100TB of information using Windows...
The dark art of Remote Online Social Engineering by PWC
PWC Published it's resent Cyber security research: The dark art of Remote Online Social Engineering Research conducted on an emerging attack vector: threat actors using so-called âcatfishingâ techniques to target organisations. Cyber security research: Can...
Scam-as-a-Service operation made more than $6.5 million in 2020
According to ZDNet: Scam-as-a-Service operation made more than $6.5 million in 2020 "Classiscam" operation is made up of around 40 groups operating in the US and across several European countries. Read more about Examples and Numbers of Social Engineering attacks...
Donât fall for it: Health officials warn of scammers trying to charge for COVID-19 vaccine
Donât fall for it: Health officials warn of scammers trying to charge for COVID-19 vaccine. The technique is called water hole, the scammers know people looks for COVID-19 vaccines, so they build officially look websites that sells vaccines.Florida health officials...
Information stolen from companies after the hack into SolarWinds is now up for sale
SolarWind's Data Breach - Update Some of the information stolen from the various companies after the hack into Solarwinds is now up for sale. Â What's on the shelf: Microsoft Information (Partial Source Code) for $ 600k Cisco Information (source...
NATO horizon 2030 report predicts the rise of cyber AI / ML warfare
NATO horizon 2030 report predicts the rise of cyber AI / ML warfare. We are the only ones who already have an AI that can help you to defend against AI reinforced attacks. >>  Add more data from the report  <<
What can we learn from Mimecast Hacker Breach
Mimecast, which provides email management systems, updates that the hacker was able to hack into the company's systems and access customer information. According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services...
1 of 10 shopping ads promoted on Google potentially lead to phishing sites
How email fishing to one of the company’s executives caused the leakage of 3GB of Namesouth sensitive information
Information from Namesouth, a company that supplies spare parts for vehicles, was published online after it refused to pay a ransom. Â The attacking group NetWalker is the one that attacked the company in November last year and is now releasing 3GB of sensitive...
How to reduce the risk of dealing with ransomware attacks on your business
Assault groups that specialize in ransomware attacks are a business entity for everything. At the same time, it should be remembered that unlike the business world where (usually) there are rules and ethics, with financial motivation fueled by relative anonymity, the...