by eran | 19 Dec 2025 | Examples and Solutions
Must have guide Prompt Engineering Your Family Christmas Dinner A Survival Guide Welcome to the Future of Festive Dining Revolutionize Your Holiday with Prompt Engineering Grandma is just an Unaligned LLM: A Prompt Engineering Guide to Christmas The bird is roasting,...
by eran | 21 May 2021 | Academy, Examples and Solutions
* This article is part of a sequel on Social Engineering Attack Types and how to avoid them. You can read our previous article about spear phishing, here: (https://web.aumint.io/spearphishing-spear-phishing/). Whaling is a sophisticated and specifically targeted...
by eran | 20 May 2021 | Academy, Examples and Solutions
Perhaps you remember hearing about people getting requests from a Nigerian prince, a scam known as Phishing? Hackers spread wide nets, playing the numbers and hoping to take advantage of people’s naivete and generosity. Today’s hackers are far more...
by eran | 26 Apr 2021 | Academy, Examples and Solutions
What is a IDN Homograph Attack? IDN (Internationalized Domain Name) Homograph Attack is a manipulative and simple, but sophisticated type of cyber attack. It is also called a “UTF8 URL Impersonation”. How does it work? A hacker poses as a trusted...
by eran | 9 Mar 2021 | Examples and Solutions
What is Warshipping ? Warshipping uses disposable, low-cost, low-power computers to remotely perform close-proximity attacks, regardless of the hacker’s location. The attacker can control the device from the comfort of their home anywhere in the world. The only thing...
by Freddy Morris | 9 Feb 2021 | Examples and Solutions, News
Method of infection: Water-holing OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses. How does water holing attack work? The victim enters the infected website. The website checks if the...