AUMINT.io Blog
Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources
Recent Bite-Size Posts
WhatsApp payments: How secure are they?
WhatApp recently launched an in-chat payment option in Singapore following successful roll-outs in both India and Brazil. And, given how widely used WhatsApp is, it’s likely that it will be launched in other regions in the future. However, there are security concerns...
3 cybersecurity challenges around hybrid working
Although some companies are requesting their staff to return to the office, it is unlikely that there will be a complete return to full-time office working. Today, in the US around 25% of work is done remotely - a 500% increase compared to 2019. And whilst hybrid...
4 of the most well-known crypto-ransomware
The use of crypto-ransomware - a specific type of malware that encrypts files on the victim’s computer until a ransom is paid - is on the rise. In 2022 alone, ​​organisations globally detected 493.33 million ransomware attacks. Below are some of the most well-known...
How to do cybersecurity on a budget
Businesses globally are going through a tough economic period and as a result, budgets are being cut. Cybersecurity can be one of the first departments to see cuts, as they don’t directly contribute to increasing revenues. However, given the cost of cybercrime is...
Crypto-ransomware vs doxware: What are the differences?
Hackers use a variety of malware to achieve their aims. And as they become more sophisticated, and techniques evolve to combine different types of attack strategies, it can be confusing to understand the differences between them. In this article, we’re going to look...
How is generative AI impacting cybersecurity?
Generative AI has been hitting the headlines recently with the release of ChatGPT at the end of 2022. And while it can be considered a useful tool for certain types of tasks, it is also posing a threat to companies, as hackers are using it to create more realistic...
Are your employees your biggest security threat?
Social media is now a part of everyday life. It’s impossible to avoid it these days. However, whilst posting about work successes or life events seems innocuous enough, this information can be used by hackers. In fact, social media data breaches accounted for 56% of...
Leaking-focused RaaS: a new type of threat?
Ransomware-as-a-Service (RaaS) has been growing in popularity with hackers as it makes extortion more accessible. Criminals don’t need to develop the ransomware themselves, instead, they can purchase it from certain ransomware groups who create it to sell via a...
Cryptomalware: What is it and is it on your computer?
Cryptomalware - also known as cryptojacking - is when attackers install undetectable malware on a victim’s computer in order to use their computing resources to mine cryptocurrency. With the popularity of all kinds of cryptocurrency surging, this type of attack is...
How to combat insider threats
Insider threats - when an employee illegally discloses confidential information - are often a result of sophisticated social engineering. And, as we enter into difficult economic times, the potential for this to happen increases. But why are some employees...
Why cybersecurity is so important during a recession
With fears of a recession looming, many companies are looking for ways to reduce spending. Cybersecurity is an area where it can be tempting to cut costs as it doesn’t directly contribute to the bottom line. However, there are several reasons why cybersecurity should...
5 ways AI can help with cybersecurity
Although artificial intelligence (AI) is not new, it’s become the focus of many mainstream conversations thanks to the launch of high-profile generative AI like ChatGPT and Dall-E. So how can cybersecurity professionals benefit from using AI in their work? Curating...