AUMINT.io Blog
Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources
Recent Bite-Size Posts
8 Cybersecurity predictions for 2024
Global technology research and consulting firm, Gartner, recently revealed their top eight cybersecurity predictions for the next few years. The way companies hire cybersecurity workers will change over the next few years as the adoption of generative AI will close...
Cybercrime in the manufacturing sector
One of the most targeted sectors for cybercrime globally is manufacturing. In 2023, it was the industry with the highest share of cyberattacks, encountering around 25% of the worldwide total. Of these, malware and ransomware were the top types of attack. The average...
End-to-end encryption: How secure is it?
As a security feature that comes with many messaging apps and data sharing software, end-to-end encryption is a way of making sure your communications and data is protected. However, is it as secure as we believe? What is end-to-end encryption? End-to-end encryption...
Will quantum computing be a threat to cybersecurity?
As developments in quantum computing lead to greater computing power, many are concerned about its potential impact on cybersecurity. Whilst it will bring benefits, such as identifying and shutting down cyber attacks more quickly, the negative consequences could be...
How to respond to a double extortion attack
Ransomware attacks are on the rise and now, rather than simply demanding money in return for the release of a company’s data, many cybercriminals are deploying double or even multiple extortion attacks. Not only do they encrypt the victim company’s data, but they also...
Explainer: What is Volt Typhoon and what does it mean for your business?
Last month, the US government revealed that they had disrupted a cyber-spying operation by a Chinese state-sponsored cyber group called Volt Typhoon. The group has been active since 2021, and whilst there wasn’t a direct attack, it had installed malicious software...
Should cybersecurity be taught in schools?
As we live in an increasingly digital world - for both our personal and professional lives - children are required to immerse themselves in technology from a much younger age. However, they aren’t really equipped to deal with the dangers that present themselves...
Cybercrime in the financial sector
Banks and financial institutions are one of the biggest targets for cybercriminals, and in recent years have seen record numbers of attacks. For example, 2021 saw an all-time high of 2,527 attacks which reduced to 1,829 in 2022 (although this is still more than in the...
2024 Trends
TL;DR: Aumint.io, my startup, offers hope. The results of a recurring cyber training program show that practical training reduces human cyber risk and improves behaviours. 2024 Q1 - Landscape/ Macro trend Employee behaviour matters.Having employees with strong...
What is a zero trust approach to cybersecurity?
A zero trust security model is based on the idea that a company should ‘never trust, always verify.’ Unlike in traditional IT network security models that trust anyone and anything within a network once it has been initially verified, with a zero trust approach no-one...
Ransomware gang LockBit taken down
Last month, the network of the notorious ransomware gang, LockBit, was seized by law enforcement. This gang was not only responsible for around 25% of attacks in the past year, according to the UK’s National Crime Agency (NCA), it was also the pioneer for the...
What is double extortion ransomware?
Double extortion attacks are a type of ransomware attack with higher stakes. In a regular ransomware attack, a hacker will infiltrate a company’s network, encrypt the data and demand a ransom to release it. This causes disruption as, whilst their systems and data are...