• Home
  • Contact us
  • Blog
  • Pricing
Get Risk Report FREE
  • Home
  • Contact us
  • Blog
  • Pricing
Information stolen from companies after the hack into SolarWinds is now up for sale

Information stolen from companies after the hack into SolarWinds is now up for sale

by Freddy Morris | 14 Jan 2021 | Examples and Solutions, News

SolarWind’s Data Breach – Update   Some of the information stolen from the various companies after the hack into Solarwinds is now up for sale.     What’s on the shelf:   Microsoft Information (Partial Source Code) for $ 600k Cisco...

NATO horizon 2030 report predicts the rise of cyber AI / ML warfare

by Freddy Morris | 14 Jan 2021 | Examples and Solutions, News

NATO horizon 2030 report predicts the rise of cyber AI / ML warfare. We are the only ones who already have an AI that can help you to defend against AI reinforced attacks. >>  Add more data from the report...

What can we learn from Mimecast Hacker Breach

by Freddy Morris | 13 Jan 2021 | Examples and Solutions, News

Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information. According to the company, the hacker was able to gain access to a certificate used to identify Mimecast...
1 of 10 shopping ads promoted on Google potentially lead to phishing sites

1 of 10 shopping ads promoted on Google potentially lead to phishing sites

by Freddy Morris | 12 Jan 2021 | Examples and Solutions, News, Statistics

1 of 10 shopping ads promoted on Google potentially lead to phishing sites

How email fishing to one of the company’s executives caused the leakage of 3GB of Namesouth sensitive information

by Freddy Morris | 12 Jan 2021 | Examples and Solutions, News

Information from Namesouth, a company that supplies spare parts for vehicles, was published online after it refused to pay a ransom.     The attacking group NetWalker is the one that attacked the company in November last year and is now releasing 3GB of sensitive...
1 of 10 shopping ads promoted on Google potentially lead to phishing sites

How to reduce the risk of dealing with ransomware attacks on your business

by eran | 12 Jan 2021 | Examples and Solutions, News

Assault groups that specialize in ransomware attacks are a business entity for everything.  At the same time, it should be remembered that unlike the business world where (usually) there are rules and ethics, with financial motivation fueled by relative anonymity, the...
« Older Entries
Next Entries »

Categories

  • Academy
  • Examples and Solutions
  • News
  • Statistics

Recent Posts

  • Why Our Brains Let Us Fall for Scams – And How to Shield Against Them
  • (no title)
  • Schools Under Siege: Tackling 3,000 Cyber Threats Weekly
  • Partnering for Compliance: Why the Right IT Ally is Crucial in the EU Regulatory Landscape
  • (no title)

Archives

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021

Tags

Prevent a Social Engineering Attack Social Engineering Cyber Attack Type
AUMINT.io logo

AUMINT.io is the leading company in Social Engineering Cybersecurity protection. We specialize in helping companies to protect their assets and information from Social Engineering related hacker attacks. Our services are tailored to each company’s unique mental and operational business vulnerabilities and teach them how to protect them. Our services are complimentary to Anti-Virus. Anti-Virus protects your computers, But your people have access to computers. If one cannot get it technologically – you may get to it via your employees.

Copyright © 2025, AUMINT.io . All rights Reserved.

Follow us

  • Follow
  • Follow
  • Follow
  • Follow

Privacy policy

Red-Team prices

Social engineering prices