SolarWind’s Data Breach – Update
Some of the information stolen from the various companies after the hack into Solarwinds is now up for sale.
What’s on the shelf:
- Microsoft Information (Partial Source Code) for $ 600k
- Cisco Information (source code for some products) for $ 500k
- SolarWinds information (source code of the entire product) for $ 200k.
- FireEye Information (Red Team Assault Tool) for $ 50k.
Oh, and there is a sale … a package of all the above information for a million dollars.
WIIFM (What’s in it for me)
Beware: the next wave of ransomware and malware will not be recognized by antivirus which means that if you install it, the hackers will have 6 to 9 months of data
WSID2P (What should I do to protect)
Be aware. They are coming for you, and they’ll use any trick in the book for it.
Get informed and Start to protect your company now.
( Source: http://solarleaks.net/)
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
🕵️♂️ 5 Free Zero-Day Trackers Every CISO Needs Handy 🕵️♂️
Zero-days remain one of the biggest blind spots for security teams. Staying ahead means knowing where to track active vulnerabilities before they hit mainstream feeds. Here are 5 free resources every CISO should keep in their toolkit:
1️⃣ CISA Known Exploited Vulnerabilities (KEV) Catalog – Actively exploited vulnerabilities updated continuously.
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
2️⃣ MITRE CVE Database – The definitive catalog of vulnerabilities, including emerging zero-days.
https://cve.mitre.org/
3️⃣ Google Project Zero – Research group uncovering and publishing zero-day findings.
https://googleprojectzero.blogspot.com/
4️⃣ ZDI (Zero Day Initiative) – Public advisories on discovered and responsibly disclosed zero-days.
https://www.zerodayinitiative.com/advisories/published/
5️⃣ Exploit Database (OffSec) – Community-driven database tracking zero-day exploits and proof-of-concepts.
https://www.exploit-db.com/
⚡ These trackers won’t stop attacks alone, but they give CISOs the visibility to patch fast, prioritize risks, and brief leadership with confidence.
At AUMINT.io, we go a step further – simulating how attackers exploit the human factor with phishing, vishing, and deepfake social engineering before a zero-day even gets weaponized.
🔗 Want to see how your employees would react under a zero-day-themed phishing test? Book a demo
#ZeroDay #CISO #CyberSecurity #VulnerabilityManagement #AUMINT