SolarWind’s Data Breach – Update
Some of the information stolen from the various companies after the hack into Solarwinds is now up for sale.
What’s on the shelf:
- Microsoft Information (Partial Source Code) for $ 600k
- Cisco Information (source code for some products) for $ 500k
- SolarWinds information (source code of the entire product) for $ 200k.
- FireEye Information (Red Team Assault Tool) for $ 50k.
Oh, and there is a sale … a package of all the above information for a million dollars.
WIIFM (What’s in it for me)
Beware: the next wave of ransomware and malware will not be recognized by antivirus which means that if you install it, the hackers will have 6 to 9 months of data
WSID2P (What should I do to protect)
Be aware. They are coming for you, and they’ll use any trick in the book for it.
Get informed and Start to protect your company now.
( Source: http://solarleaks.net/)
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
🌐 Free DNS Monitoring Tools Revealing Stealthy Attacks 🌐
DNS is the backbone of your network – and attackers increasingly exploit it for data exfiltration, command-and-control, and malware communication. The good news? There are free tools CISOs can use to monitor and detect stealthy DNS attacks.
Here are the top free DNS monitoring tools:
1️⃣ SecurityTrails Free Tier – Track domain changes, DNS records, and suspicious activity.
🔗 https://securitytrails.com/
2️⃣ Farsight DNSDB (Community Access) – Historical DNS data to detect anomalies.
🔗 https://www.farsightsecurity.com/solutions/dnsdb/
3️⃣ PassiveTotal (Free Plan) – Aggregates DNS and threat intelligence for early detection.
🔗 https://www.riskiq.com/solutions/passivetotal/
4️⃣ OpenDNS Investigate (Free Tier) – Domain reputation and threat visibility from Cisco.
🔗 https://umbrella.cisco.com/products/investigate
5️⃣ Quad9 DNS Monitoring – Free recursive DNS service with threat blocking and logging.
🔗 https://www.quad9.net/
6️⃣ Pi-hole – Network-level DNS sinkhole that can monitor and block suspicious domains.
🔗 https://pi-hole.net/
7️⃣ Dnstrails Community Edition – DNS intelligence and threat mapping.
🔗 https://dnstrails.com/
⚡ These tools provide early indicators of compromise, helping CISOs spot threats before they escalate. DNS monitoring is often overlooked, but it’s a powerful layer of defense.
At AUMINT.io, we combine technical monitoring with human attack simulations, showing how attackers leverage phishing, vishing, and social engineering to exploit DNS and user behavior simultaneously.
🔗 Want to see how your team would react to DNS-targeted attacks? Book a free demo
#DNSMonitoring #CISO #CyberSecurity #ThreatDetection #AUMINT