SolarWind’s Data Breach – Update
Some of the information stolen from the various companies after the hack into Solarwinds is now up for sale.
What’s on the shelf:
- Microsoft Information (Partial Source Code) for $ 600k
- Cisco Information (source code for some products) for $ 500k
- SolarWinds information (source code of the entire product) for $ 200k.
- FireEye Information (Red Team Assault Tool) for $ 50k.
Oh, and there is a sale … a package of all the above information for a million dollars.
WIIFM (What’s in it for me)
Beware: the next wave of ransomware and malware will not be recognized by antivirus which means that if you install it, the hackers will have 6 to 9 months of data
WSID2P (What should I do to protect)
Be aware. They are coming for you, and they’ll use any trick in the book for it.
Get informed and Start to protect your company now.
( Source: http://solarleaks.net/)
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
🔍 Free Insider Threat Detection Tools CISOs Can’t Ignore 🔍
Not every threat comes from the outside – some of the most costly breaches start with insiders, whether accidental or malicious. The good news? There are free and open-source tools CISOs can use today to strengthen insider threat visibility.
Here are some to explore:
1️⃣ OSSEC – Open-source HIDS that monitors log files, rootkits, registry changes, and suspicious activity.
🔗 https://www.ossec.net
2️⃣ Wazuh – SIEM + threat detection platform with powerful log analysis and insider risk visibility.
🔗 https://wazuh.com
3️⃣ Graylog (Open) – Log management for monitoring anomalous patterns that may indicate insider misuse.
🔗 https://www.graylog.org
4️⃣ Zeek (formerly Bro) – Network monitoring framework that can flag unusual internal data flows.
🔗 https://zeek.org
5️⃣ TheHive – Open-source SOC platform for incident response with insider threat detection workflows.
🔗 https://thehive-project.org
6️⃣ Prelude OSS – Hybrid IDS that supports insider activity monitoring and alert correlation.
🔗 https://www.prelude-siem.org
7️⃣ Sysmon (Microsoft Sysinternals) – Tracks detailed process, file, and registry activity for insider behavior detection.
🔗 https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon
⚡ Takeaway: Insider threats are harder to spot than external attacks because they often look like legitimate activity. These free tools give CISOs eyes inside the perimeter without blowing budgets.
At AUMINT.io, we go further – by simulating social engineering and insider-like attack vectors to see how employees react, then delivering targeted awareness to stop the threat at its source.
🔗 Ready to uncover how your employees would respond to insider-style scenarios? Book a free demo
#InsiderThreats #CISO #CyberSecurity #ThreatDetection #AUMINT