AUMINT.io Blog

 

Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources

🚨Are we on the brink of a cyber-war?🚨

📢 What happened? An allegedly Chinese-sponsored hacker group carried out a sustained cyberattack (2021-2023) on the Belgian State Security Service (VSSE), stealing sensitive information.The hackers exploited a vulnerability in Microsoft Exchange servers...

Ghost Code: The Sinister Rise of Invisible Phishing with Unicode Obfuscation đź‘»

Imagine a digital world where malicious code can hide in plain sight, invisible to the human eye and security scanners. This isn't science fiction; it's the reality of a new and alarming phishing technique uncovered by Juniper Threat Labs. Researchers have exposed a...

The Psychology of Phishing: Why We Fall For It

Phishing attacks, those deceptive emails or messages designed to steal your personal information, are a constant threat.But why do they work?It's not just about technology; it's about understanding the psychology behind these scams. Let's analyse the leverages that...

Five major cyberattacks of 2024

The number of cyberattacks has increased in recent years. Between April 2023 and March 2024, there was an 81% increase, and the types of companies now being targeted aren’t just major corporations. Cybercriminals are going after smaller ones too. They’re also...

A major ransomware attack on the NHS

Earlier in June, Synnovis, a pathology services provider to several of London’s NHS Trust hospitals was the victim of double extortion ransomware. According to one healthcare cybersecurity expert, “this is probably one of the most significant cyberattacks on the NHS”...

Recent Bite-Size Posts

International operation downs Qakbot malware infrastructure

A major digital sting operation, involving seven countries, resulted in the downing of a malware infrastructure that criminals have used to steal millions of dollars from their victims. The malware, Qakbot (also known as Qbot or Pinkslipbot) had been active since 2007...

Do demographic factors influence social engineering success?

Social engineering is one of the most successful tactics that cyber criminals can use to get access to confidential information or infiltrate company systems and networks. Its success depends on gaining trust. This is often done by using information that can be...

4 ways ransomware is evolving

Ransomware remains a real threat for organisations, with more than 493m attacks in 2022 alone, down from 2021 but far above the amount in the preceding years. And one of the reasons that it remains a threat is because of the ability of ransomware gangs to evolve their...

How prepared are companies for a potential cyber attack?

The risk of cybersecurity attacks increases year on year, particularly as cyber criminals are now leveraging more sophisticated technologies and techniques to be able to carry out their activities at scale. For example, a small study recently showed that phishing...

A software supply chain attack that targets the banking sector

In a recent article, we highlighted the rise of software supply chain attacks. These types of attacks are very serious as, often, the target isn’t the software vendor itself but their customers. By accessing the end users’ systems, they are able to steal valuable...

3 risky behaviours of employees and how to prevent them

Did you know that your employees are probably your biggest cybersecurity weakness? According to IBM Security X-Force’s Threat Intelligence Index 2023, 19% of breaches originate from the inside, and this is because so many involve a human element: social engineering,...

Which industries are most at risk of cyber attacks?

Whilst a cyber attack, such as a ransomware attack, could happen to any organisation, regardless of the size, location or type of business, there are some industries that are more likely to be targeted than others. Here are the three most targeted industries according...

Why cybersecurity is essential for customer trust

As companies are increasingly relying upon collecting consumers’ personal data - either because it’s essential to their operations or because they want to create unique customer experiences - the more they need to ensure they protect that data. Now, if you sell a...

5 of the most notable ransomware attacks in 2023

Now that we’re halfway through the year, it’s a good time to review the cybersecurity landscape, particularly around ransomware. Whilst the volume of ransomware attacks decreased by 23% in 2022 compared to 2021, there was ransomware resurgence in early 2023, with the...

3 ways generative AI can support cybersecurity

We recently looked at how generative AI, such as ChatGPT, is creating new cybersecurity challenges as it makes cybercrime more accessible. However, as with most new technology, it works both ways. Generative AI can also be leveraged by companies to enhance security....

How to prevent departing employees becoming insider threats

Insider threats are a growing concern for businesses globally. According to Gurucul’s 2023 Insider Threat report, 74% of organisations say insider attacks have become more frequent, and more than half have experienced an insider threat in the last year. As many major...

See how the Hacker sees you

Get your FREE Exposure Report NOW
Get the report