Coveware, which provides response services to ransomware attacks, has released a report for the fourth quarter of 2020.
The 4 most interesting data from the report
1. The average ransom payment stands at $ 154,108
It is a decrease of 34% from the third quarter.
2. Organisations decline to pay
The significant decrease in the average payment is due to the fact that more and more organizations are deciding not to pay the ransom.
3. 70% of ransomware attacks also include theft of information from the victim and double extortion
It is an increase of 43% from the third quarter.
4. Social Engineering is the main attack type
In the current quarter the main attack channel was social engineering attacks.
Β _________________
( Source: Coverware Ransomeware Report)
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
βοΈπ Free Cloud Misconfiguration Scanners Youβll Wish You Tried Earlier βοΈπ
Cloud misconfigurations remain the #1 cause of breaches in 2025 β and the worst part is, most could have been avoided with the right tools. Here are some free scanners that every CISO should have in their arsenal:
1οΈβ£ ScoutSuite β Multi-cloud security auditing tool by NCC Group.
π https://github.com/nccgroup/ScoutSuite
2οΈβ£ Prowler β AWS, Azure, and GCP security best practices scanner.
π https://github.com/prowler-cloud/prowler
3οΈβ£ CloudSploit by Aqua β Continuous configuration monitoring for major cloud providers.
π https://github.com/aquasecurity/cloudsploit
4οΈβ£ Checkov β Policy-as-code scanner for IaC (Terraform, Kubernetes, CloudFormation).
π https://github.com/bridgecrewio/checkov
5οΈβ£ Cloud Custodian β Rules engine for governance and compliance enforcement.
π https://github.com/cloud-custodian/cloud-custodian
β‘These tools highlight risky IAM roles, exposed buckets, insecure defaults, and weak policies β the same gaps attackers exploit.
At AUMINT.io, we look at the other side of the coin β simulating how attackers exploit the human misconfigurations through phishing, vishing, and social engineering. Because even a perfectly hardened cloud is vulnerable if an employee gives access away.
π Curious how exposed your human layer really is? Book a free demo
#CloudSecurity #CISO #CyberSecurity #ThreatIntelligence #AUMINT