AUMINT.io Blog

 

Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources

The Psychology of Phishing: Why We Fall For It

Phishing attacks, those deceptive emails or messages designed to steal your personal information, are a constant threat.But why do they work?It's not just about technology; it's about understanding the psychology behind these scams. Let's analyse the leverages that...

Five major cyberattacks of 2024

The number of cyberattacks has increased in recent years. Between April 2023 and March 2024, there was an 81% increase, and the types of companies now being targeted aren’t just major corporations. Cybercriminals are going after smaller ones too. They’re also...

A major ransomware attack on the NHS

Earlier in June, Synnovis, a pathology services provider to several of London’s NHS Trust hospitals was the victim of double extortion ransomware. According to one healthcare cybersecurity expert, “this is probably one of the most significant cyberattacks on the NHS”...

Hacktivists: what are they and why should you care?

Hacktivists are generally known to carry out cyberattacks for, what they perceive to be, the greater good of society. They’re a bit like the Robin Hoods of the internet. However, in recent years, the nature of hacktivism has changed and as such is potentially becoming...

How to choose a strong password

We’ve all been guilty of using weak passwords, or of using the same one for all our accounts - it's easier to remember. For some of you, this may still be the case. But doing this can make you vulnerable to attackers. More than 60% of internet users admit to using the...

Recent Bite-Size Posts

Should businesses be wary of TikTok?

Over the last few weeks, a number of countries have banned the use of TikTok on government devices over concerns that confidential data could be shared with the Chinese government. Are these concerns legitimate and should companies be worried about employees using the...

Pig butchering scams: what are they and how to spot them

Over the last few years a new type of financial scam (largely around cryptocurrency) has emerged that takes advantage of social engineering techniques. It’s known as “pig-butchering.”  The name comes from the fact that scammers work hard to build trust with the...

Risk assessment social engineering

#CISO, If you call your servers, laptops, stations, firewalls, routers, mobile phones and faxes - The stuff, so stop reading now. But you don’t. You do an asset list, with specific risk for each asset, mitigation plan and monitoring. Same you need to do with your...

3 coworking cybersecurity risks to be aware of

Since the pandemic, the use of coworking spaces has increased as more companies want to give their employees flexibility around how they work. In the US in 2022, more than 1m people worked in co-working spaces, compared to just 331,000 in 2015, and more than one third...

What is Ransomware-as-a-Service (RaaS)?

The number of ransomware attacks have been increasing in recent years, and this is partly linked to the rise of Ransomware-as-a-Service. But what is it and how does it work? What is RaaS? Ransomware-as-a-Service (RaaS) is a subscription-based business model used by...

What the FBI’s take down of Hive means for ransomware attacks 

The FBI recently took down prolific ransomware group, Hive, preventing $130m being taken through attacks. How did this happen and what does it mean, if anything, for other ransomware groups? Who is Hive? Hive is a notorious ransomware group that has attacked more than...

Why is diversity important for cybersecurity teams?

When you picture a cybersecurity professional, what do they look like? According to statistics, 62% of computer science professionals (including cybersecurity) are white, and 76% are men. Of course, making sure you have qualified people working for you is important,...

6 cybersecurity predictions for 2023

2022 was a tough year in cybersecurity, with global attacks in Q4 increasing 28% compared to 2021. The threat landscape is likely to continue evolving throughout 2023. Here are some of the cybersecurity predictions from the wider community to help you prepare for the...

7 of the biggest data breaches of 2022

Data breaches continued to affect all types of companies in 2022, and the average cost of these breaches was $4.35 million. The reputational damage caused by data breaches is also huge, and can be hard to recover from.  Here are seven of the biggest data breaches...

10 cybersecurity statistics from 2022

2022 showed that cyber attacks are becoming increasingly sophisticated and show no signs of slowing. Major multinational companies, such as Nvidia, Toyota and Kronos, as well as national governments including Costa Rica and Montenegro, all fell victim to ransomware...

Top cybersecurity trends from 2022

The cybersecurity threat landscape changes quickly, with ransomware, supply chain exploits, multi-vector attacks and others increasing and becoming more sophisticated. In response, security teams need to evolve quickly to stay ahead, and over the last year we’ve seen...

When was the last time you did a cybersecurity audit?

You might have cybersecurity systems and processes in place, but are you reviewing them regularly to make sure you don’t have any holes in your network security, and to make sure you’re compliant with the latest security regulations? Here are some key things to...

See how the Hacker sees you

Get your FREE Exposure Report NOW
Get the report