AUMINT.io Blog
Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources
Recent Bite-Size Posts
Will quantum computing be a threat to cybersecurity?
As developments in quantum computing lead to greater computing power, many are concerned about its potential impact on cybersecurity. Whilst it will bring benefits, such as identifying and shutting down cyber attacks more quickly, the negative consequences could be...
How to respond to a double extortion attack
Ransomware attacks are on the rise and now, rather than simply demanding money in return for the release of a company’s data, many cybercriminals are deploying double or even multiple extortion attacks. Not only do they encrypt the victim company’s data, but they also...
Explainer: What is Volt Typhoon and what does it mean for your business?
Last month, the US government revealed that they had disrupted a cyber-spying operation by a Chinese state-sponsored cyber group called Volt Typhoon. The group has been active since 2021, and whilst there wasn’t a direct attack, it had installed malicious software...
Should cybersecurity be taught in schools?
As we live in an increasingly digital world - for both our personal and professional lives - children are required to immerse themselves in technology from a much younger age. However, they aren’t really equipped to deal with the dangers that present themselves...
Cybercrime in the financial sector
Banks and financial institutions are one of the biggest targets for cybercriminals, and in recent years have seen record numbers of attacks. For example, 2021 saw an all-time high of 2,527 attacks which reduced to 1,829 in 2022 (although this is still more than in the...
2024 Trends
TL;DR: Aumint.io, my startup, offers hope. The results of a recurring cyber training program show that practical training reduces human cyber risk and improves behaviours. 2024 Q1 - Landscape/ Macro trend Employee behaviour matters.Having employees with strong...
What is a zero trust approach to cybersecurity?
A zero trust security model is based on the idea that a company should ‘never trust, always verify.’ Unlike in traditional IT network security models that trust anyone and anything within a network once it has been initially verified, with a zero trust approach no-one...
Ransomware gang LockBit taken down
Last month, the network of the notorious ransomware gang, LockBit, was seized by law enforcement. This gang was not only responsible for around 25% of attacks in the past year, according to the UK’s National Crime Agency (NCA), it was also the pioneer for the...
What is double extortion ransomware?
Double extortion attacks are a type of ransomware attack with higher stakes. In a regular ransomware attack, a hacker will infiltrate a company’s network, encrypt the data and demand a ransom to release it. This causes disruption as, whilst their systems and data are...
Why phishing is becoming a growing threat
Phishing attacks are nothing new, in fact they’re one of the most typical social engineering techniques cyber criminals use to get confidential information from people. And these types of attacks have been on the rise. In Q3 2023, more than 493.2m phishing emails were...
Deepfakes: A threat to democracy?
2024 is a record year for elections, with more than 40 countries, representing more than 40% of the world’s population (and a much higher proportion of global GDP), going to vote. At any time, elections can be at risk of interference - either from internal malicious...
Have you checked your cybersecurity processes lately?
You may take it for granted that your organisation has cybersecurity systems and processes in place, but have you checked them recently to make sure everything is up to date? Because even the most diligent businesses and organisations - including government agencies -...