United States Reported Less Data Breaches in 2020 but with much more Expensive Successful Hacker Attacks
According to the annual report of the Identity Theft Resource Center (ITRC), 1,108 cyber incidents were reported in 2020 and the number casualties from these incidents was close to 301 million people, a drop of 66% over the previous year.
The social engineering technique of impersonation also helped attackers reap massive profits:
The volume of business fraud and hacking by corporate e-mail systems (BECs) reported to the FBI in 2020 was US$ 1.8 Billion – a figure that reflects half of all cyber damage in monetary terms.
“The trend away from mass data breaches and toward more precise and sophisticated cyberattacks doesn’t mean businesses can relax. Just the opposite. They need to learn whole new ways of protecting their data.”
– James E. Lee, ITRC COO
Read more about Examples and Numbers of Social Engineering Hacker Attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
🧩 OT Security Without Segmentation? That’s a Door Left Wide Open.
🚪 Hackers broke into Lviv’s heating utility via exposed IT – then walked right into OT.
🌡️ 600 buildings lost heat for 2 days. No segmentation. No detection.
🔍 That’s not bad luck – that’s bad governance.
💡 Boards must prioritize secure architecture – with OT/IT segmentation baked in.
🛡️ AUMINT.io delivers secure-by-design playbooks and simulations tailored for directors.
📆 Get your playbook: https://calendly.com/aumint/aumint-intro
💬 Ever seen an OT disaster coming from miles away? Tell us how 👇
🔎 #CyberArchitecture #BoardResilience #AUMINT
Why Microsoft’s New Secure Future Initiative Won’t Be Enough Without You
🛡️ Microsoft’s Secure Future Won’t Secure Your People
📢 Microsoft’s new “Secure Future Initiative” is a powerful pivot – stronger engineering, more AI-driven threat detection, tighter controls. But…
🚨 None of it stops a user from clicking the wrong link.
🧠 Social engineering still bypasses the smartest tech. Why? Because humans trust, skip, forget, and fall for what feels safe.
🔐 AUMINT.io’s Trident platform fills the human gap: – Simulates ultra-targeted phishing + impersonation – Rewires reflexes through adaptive training – Shows CISOs where the next breach might start
📊 90% of breaches still involve human behavior. Microsoft can’t fix that. You can.
💬 Book your intro now – before a smart user becomes your weakest link.
#SecureFuture #CISO #HumanFirewall #SecurityAwarenessTraining #SocialEngineering #MicrosoftSecurity #TridentByAUMINT
Weaponized Trust – How Hackers Are Turning Certificates Against You
🔐 Hackers Are Signing Malware With Trusted Certificates
⚠️ They’re no longer brute-forcing their way in – they’re using stolen private keys and signing certificates to slip past your defenses.
📦 Signed malware now looks safe to: – Antivirus – EDR systems – Users
💥 This isn’t just technical – it’s psychological. Users are trained to trust “Verified” files. And that’s exactly what attackers exploit.
🧠 AUMINT.io’s Trident platform breaks the false trust cycle: – Simulates realistic attack behaviors – Conditions users to question what looks legit – Provides CISOs with real-time risk insights
🎯 When malware hides behind a trusted certificate, your last line of defense is human instinct. Train it with Trident.
💬 Book your intro call – before trust gets weaponized against you.
#CyberResilience #StolenCerts #HumanFirewall #CISO #SecurityAwarenessTraining #TridentByAUMINT #SocialEngineeringDefense #SignedMalware