AUMINT.io Blog
Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources
Recent Bite-Size Posts
5 tips for staying cyber secure this Christmas
Christmas and the holiday period gives malicious actors plenty of material to work with when developing realistic social engineering hacks. Here are some of the key things you need to keep an eye out for. 1. Make sure your social media profiles are private For social...
Top World Cup-related phishing attacks
Big events are always a target for phishing attacks, as it means there will be lots of people willing to pay a high price to ensure they don’t miss out on a ticket. This year’s football World Cup in Qatar is no different. In the run-up to and during the...
Mitigating the impact of fake social media accounts
Whilst social media is a vital tool for brands to communicate with customers, companies need to consider the impact these platforms can have on their business. They hold the power to change the rules of engagement without warning, which can lead to unintended...
Could cybersecurity complacency be costing you?
Everyone knows that cybersecurity is important, particularly as cyber criminals are using increasingly sophisticated methods to hack into large company networks. But it can be frustrating when you can’t use a certain app that would make team communication easier, and...
5 ransomware groups to be aware of
Ransomware attacks are increasingly focusing on bigger targets, with several major international companies falling victim in recent years. As a result, it’s crucial for all companies to take these sorts of threats seriously. Knowing who you’re dealing with is the...
Why you should only use your work laptop for work
If you’re someone who quickly checks their personal email or browses social media on their work laptop, then you’re not alone. According to a 2020 survey by antivirus vendor Malwarebytes, 53% of respondents reported sending or receiving personal email, 38% shopped...
Is multifactor authentication enough?
Whilst multifactor authentication (MFA) is better than single-factor authentication (i.e., only a username and password), cybercriminals are finding ways to bypass it making it less secure than many think. And there have been some high profile cases where criminals...
4 key payments ecosystem threats to look out for
The payments ecosystem has always had to consider cybersecurity carefully, but since the rapid expansion of digital payments (thanks, in part to the pandemic), it’s become critical. Particularly as cybercriminals and hackers have also become more sophisticated in...
Could your suppliers be your biggest security risk?
Ensuring the security of your own network, and making sure you have systems and processes in place to minimise the risk of cyber attacks is crucial. But what about your suppliers? If they don't take the same precautions, they could make your business vulnerable. ...
How Slack can help hackers break into your systems
Whilst Slack can be a great collaboration tool, especially for remote teams, there are a number of vulnerabilities that IT security teams need to be aware of. And several recent high profile hacks highlight this. EA Games hack For example, in 2021 hackers were able to...
Common NFT scams to look out for
As non-fungible tokens (NFTs) become more popular, it opens up new opportunities for online criminals. If you’re new to NFTs, below are some of the most common scams to be aware of. But first… What are NFTs? An NFT is a unique digital identifier that is recorded on...
How crackable are your company passwords?
Everyone knows the importance of creating a really strong password to make it more difficult for hackers to break into your systems. This is particularly important for systems that might house confidential information, such as customer data or corporate secrets. But,...