AUMINT.io Blog
Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources
Recent Bite-Size Posts
4 tips from cybersecurity experts
Cybersecurity threats are constantly evolving and trends change rapidly, so it can be hard to know how to stay on top of it all. Following leading cybersecurity experts and keeping up to date with information they share is a good way to do this, so in this blog post...
Data breach vs data leak: what’s the difference?
Although the terms data breach and data leak are sometimes used interchangeably, they are actually quite different and can therefore require slightly different approaches when it comes to cyber security. So what are the differences? What is a data breach? A data...
Should businesses be wary of TikTok?
Over the last few weeks, a number of countries have banned the use of TikTok on government devices over concerns that confidential data could be shared with the Chinese government. Are these concerns legitimate and should companies be worried about employees using the...
Pig butchering scams: what are they and how to spot them
Over the last few years a new type of financial scam (largely around cryptocurrency) has emerged that takes advantage of social engineering techniques. It’s known as “pig-butchering.” The name comes from the fact that scammers work hard to build trust with the...
Risk assessment social engineering
#CISO, If you call your servers, laptops, stations, firewalls, routers, mobile phones and faxes - The stuff, so stop reading now. But you don’t. You do an asset list, with specific risk for each asset, mitigation plan and monitoring. Same you need to do with your...
3 coworking cybersecurity risks to be aware of
Since the pandemic, the use of coworking spaces has increased as more companies want to give their employees flexibility around how they work. In the US in 2022, more than 1m people worked in co-working spaces, compared to just 331,000 in 2015, and more than one third...
What is Ransomware-as-a-Service (RaaS)?
The number of ransomware attacks have been increasing in recent years, and this is partly linked to the rise of Ransomware-as-a-Service. But what is it and how does it work? What is RaaS? Ransomware-as-a-Service (RaaS) is a subscription-based business model used by...
What the FBI’s take down of Hive means for ransomware attacksÂ
The FBI recently took down prolific ransomware group, Hive, preventing $130m being taken through attacks. How did this happen and what does it mean, if anything, for other ransomware groups? Who is Hive? Hive is a notorious ransomware group that has attacked more than...
Why is diversity important for cybersecurity teams?
When you picture a cybersecurity professional, what do they look like? According to statistics, 62% of computer science professionals (including cybersecurity) are white, and 76% are men. Of course, making sure you have qualified people working for you is important,...
6 cybersecurity predictions for 2023
2022 was a tough year in cybersecurity, with global attacks in Q4 increasing 28% compared to 2021. The threat landscape is likely to continue evolving throughout 2023. Here are some of the cybersecurity predictions from the wider community to help you prepare for the...
7 of the biggest data breaches of 2022
Data breaches continued to affect all types of companies in 2022, and the average cost of these breaches was $4.35 million. The reputational damage caused by data breaches is also huge, and can be hard to recover from. Here are seven of the biggest data breaches...
10 cybersecurity statistics from 2022
2022 showed that cyber attacks are becoming increasingly sophisticated and show no signs of slowing. Major multinational companies, such as Nvidia, Toyota and Kronos, as well as national governments including Costa Rica and Montenegro, all fell victim to ransomware...