AUMINT.io Blog

 

Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources

The Psychology of Phishing: Why We Fall For It

Phishing attacks, those deceptive emails or messages designed to steal your personal information, are a constant threat.But why do they work?It's not just about technology; it's about understanding the psychology behind these scams. Let's analyse the leverages that...

Five major cyberattacks of 2024

The number of cyberattacks has increased in recent years. Between April 2023 and March 2024, there was an 81% increase, and the types of companies now being targeted aren’t just major corporations. Cybercriminals are going after smaller ones too. They’re also...

A major ransomware attack on the NHS

Earlier in June, Synnovis, a pathology services provider to several of London’s NHS Trust hospitals was the victim of double extortion ransomware. According to one healthcare cybersecurity expert, “this is probably one of the most significant cyberattacks on the NHS”...

Hacktivists: what are they and why should you care?

Hacktivists are generally known to carry out cyberattacks for, what they perceive to be, the greater good of society. They’re a bit like the Robin Hoods of the internet. However, in recent years, the nature of hacktivism has changed and as such is potentially becoming...

How to choose a strong password

We’ve all been guilty of using weak passwords, or of using the same one for all our accounts - it's easier to remember. For some of you, this may still be the case. But doing this can make you vulnerable to attackers. More than 60% of internet users admit to using the...

Recent Bite-Size Posts

5 tips for staying cyber secure this Christmas

Christmas and the holiday period gives malicious actors plenty of material to work with when developing realistic social engineering hacks. Here are some of the key things you need to keep an eye out for. 1. Make sure your social media profiles are private For social...

Top World Cup-related phishing attacks

Big events are always a target for phishing attacks, as it means there will be lots of people willing to pay a high price to ensure they don’t miss out on a ticket. This year’s football World Cup in Qatar is no different.  In the run-up to and during the...

Mitigating the impact of fake social media accounts

Whilst social media is a vital tool for brands to communicate with customers, companies need to consider the impact these platforms can have on their business. They hold the power to change the rules of engagement without warning, which can lead to unintended...

Could cybersecurity complacency be costing you?

Everyone knows that cybersecurity is important, particularly as cyber criminals are using increasingly sophisticated methods to hack into large company networks. But it can be frustrating when you can’t use a certain app that would make team communication easier, and...

5 ransomware groups to be aware of

Ransomware attacks are increasingly focusing on bigger targets, with several major international companies falling victim in recent years. As a result, it’s crucial for all companies to take these sorts of threats seriously. Knowing who you’re dealing with is the...

Why you should only use your work laptop for work

If you’re someone who quickly checks their personal email or browses social media on their work laptop, then you’re not alone. According to a 2020 survey by antivirus vendor Malwarebytes, 53% of respondents reported sending or receiving personal email, 38% shopped...

Is multifactor authentication enough?

Whilst multifactor authentication (MFA) is better than single-factor authentication (i.e., only a username and password), cybercriminals are finding ways to bypass it making it less secure than many think.  And there have been some high profile cases where criminals...

4 key payments ecosystem threats to look out for

The payments ecosystem has always had to consider cybersecurity carefully, but since the rapid expansion of digital payments (thanks, in part to the pandemic), it’s become critical. Particularly as cybercriminals and hackers have also become more sophisticated in...

Could your suppliers be your biggest security risk?

Ensuring the security of your own network, and making sure you have systems and processes in place to minimise the risk of cyber attacks is crucial. But what about your suppliers? If they don't take the same precautions, they could make your business vulnerable. ...

How Slack can help hackers break into your systems

Whilst Slack can be a great collaboration tool, especially for remote teams, there are a number of vulnerabilities that IT security teams need to be aware of. And several recent high profile hacks highlight this. EA Games hack For example, in 2021 hackers were able to...

Common NFT scams to look out for

As non-fungible tokens (NFTs) become more popular, it opens up new opportunities for online criminals. If you’re new to NFTs, below are some of the most common scams to be aware of. But first… What are NFTs? An NFT is a unique digital identifier that is recorded on...

How crackable are your company passwords?

Everyone knows the importance of creating a really strong password to make it more difficult for hackers to break into your systems. This is particularly important for systems that might house confidential information, such as customer data or corporate secrets. But,...

See how the Hacker sees you

Get your FREE Exposure Report NOW
Get the report