AUMINT.io Blog

 

Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources

The Psychology of Phishing: Why We Fall For It

Phishing attacks, those deceptive emails or messages designed to steal your personal information, are a constant threat.But why do they work?It's not just about technology; it's about understanding the psychology behind these scams. Let's analyse the leverages that...

Five major cyberattacks of 2024

The number of cyberattacks has increased in recent years. Between April 2023 and March 2024, there was an 81% increase, and the types of companies now being targeted aren’t just major corporations. Cybercriminals are going after smaller ones too. They’re also...

A major ransomware attack on the NHS

Earlier in June, Synnovis, a pathology services provider to several of London’s NHS Trust hospitals was the victim of double extortion ransomware. According to one healthcare cybersecurity expert, “this is probably one of the most significant cyberattacks on the NHS”...

Hacktivists: what are they and why should you care?

Hacktivists are generally known to carry out cyberattacks for, what they perceive to be, the greater good of society. They’re a bit like the Robin Hoods of the internet. However, in recent years, the nature of hacktivism has changed and as such is potentially becoming...

How to choose a strong password

We’ve all been guilty of using weak passwords, or of using the same one for all our accounts - it's easier to remember. For some of you, this may still be the case. But doing this can make you vulnerable to attackers. More than 60% of internet users admit to using the...

Recent Bite-Size Posts

What can we learn from Mimecast Hacker Breach

Mimecast, which provides email management systems, updates that the hacker was able to hack into the company's systems and access customer information. According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services...

See how the Hacker sees you

Get your FREE Exposure Report NOW
Get the report