AUMINT.io Blog

 

Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources

🚨Are we on the brink of a cyber-war?🚨

📢 What happened? An allegedly Chinese-sponsored hacker group carried out a sustained cyberattack (2021-2023) on the Belgian State Security Service (VSSE), stealing sensitive information.The hackers exploited a vulnerability in Microsoft Exchange servers...

Ghost Code: The Sinister Rise of Invisible Phishing with Unicode Obfuscation đź‘»

Imagine a digital world where malicious code can hide in plain sight, invisible to the human eye and security scanners. This isn't science fiction; it's the reality of a new and alarming phishing technique uncovered by Juniper Threat Labs. Researchers have exposed a...

The Psychology of Phishing: Why We Fall For It

Phishing attacks, those deceptive emails or messages designed to steal your personal information, are a constant threat.But why do they work?It's not just about technology; it's about understanding the psychology behind these scams. Let's analyse the leverages that...

Five major cyberattacks of 2024

The number of cyberattacks has increased in recent years. Between April 2023 and March 2024, there was an 81% increase, and the types of companies now being targeted aren’t just major corporations. Cybercriminals are going after smaller ones too. They’re also...

A major ransomware attack on the NHS

Earlier in June, Synnovis, a pathology services provider to several of London’s NHS Trust hospitals was the victim of double extortion ransomware. According to one healthcare cybersecurity expert, “this is probably one of the most significant cyberattacks on the NHS”...

Recent Bite-Size Posts

Common NFT scams to look out for

As non-fungible tokens (NFTs) become more popular, it opens up new opportunities for online criminals. If you’re new to NFTs, below are some of the most common scams to be aware of. But first… What are NFTs? An NFT is a unique digital identifier that is recorded on...

How crackable are your company passwords?

Everyone knows the importance of creating a really strong password to make it more difficult for hackers to break into your systems. This is particularly important for systems that might house confidential information, such as customer data or corporate secrets. But,...

How to spot a deepfake

As deepfakes become more sophisticated and better quality, they can pose a real threat to your business. For example, they can be used by scammers to impersonate someone your employees trust - such as the company’s CEO or CFO - as a way of getting money or...

Phishing for everyone – Webinar – 29/9/2022

We opened a dedicated webinars mailing list.The only emails you'll get there are Announcements on webinars and recordings.We won't spam you (or phish you) in any way, and we won't share your email address with anyone. * indicates required Email Address * Name Phone...

3 of the biggest ransomware attacks of 2022

Ransomware attacks are unfortunately an evolving risk for companies, large and small. In some ways, they are like biological viruses because they change, adapt and continue to do damage over time. That damage includes anything from causing chaos by blocking access to...

How hackers use LinkedIn for social engineering

LinkedIn is a great networking platform for professionals across all industries. However, it can give hackers insight into your work and your company, and arm them with information they can use to manipulate you into giving away company secrets.  Why would hackers...

5 common crypto scams to look out for

Cryptocurrency (crypto) crime is on the rise. 2021 alone saw a record-breaking $14bn of crypto stolen by fraudsters. And because it’s an industry that isn’t regulated, like the traditional investment and banking sector, it’s really up to the individual to protect...

How much is your data worth to hackers?

Data breaches have become more common lately. And whilst sometimes the motivation for stealing data can be to embarrass major companies, or to gather data for espionage, the most common reason for stealing data is to make money. In fact, 86% of data breaches are about...

What is “smishing” and why should you be aware of it?

As society becomes more “mobile-first”, scammers are adapting their phishing schemes - usually done by email - to target mobile users via text messages. This is also known as smishing.  What is smishing? Smishing - SMS (or text) phishing - is when cybercriminals send...

Protecting your brand from deepfakes in the metaverse

The metaverse might still seem futuristic for many companies, but it’s likely to become an important way of connecting with people and customers in future. Some companies are already conducting business in the metaverse.  Whilst you might not be ready to join them,...

“Europol ploy”: the latest phone scam in Europe

A new phone scam is on the rise in Germany and other parts of Europe in which scammers impersonate Europol officers to trick victims into transferring them money, vouchers or personal details. How does the scam work? First, you will receive a call with a recorded...

See how the Hacker sees you

Get your FREE Exposure Report NOW
Get the report