SolarWind’s Data Breach – Update
Some of the information stolen from the various companies after the hack into Solarwinds is now up for sale.
What’s on the shelf:
- Microsoft Information (Partial Source Code) for $ 600k
- Cisco Information (source code for some products) for $ 500k
- SolarWinds information (source code of the entire product) for $ 200k.
- FireEye Information (Red Team Assault Tool) for $ 50k.
Oh, and there is a sale … a package of all the above information for a million dollars.
WIIFM (What’s in it for me)
Beware: the next wave of ransomware and malware will not be recognized by antivirus which means that if you install it, the hackers will have 6 to 9 months of data
WSID2P (What should I do to protect)
Be aware. They are coming for you, and they’ll use any trick in the book for it.
Get informed and Start to protect your company now.
( Source: http://solarleaks.net/)
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
📊 CISOs: Essential Free Risk Assessment Templates 📊
Risk assessments are the backbone of any cybersecurity strategy. But building them from scratch takes time, effort, and expertise. Luckily, there are free templates that help CISOs identify, analyze, and mitigate risks efficiently.
Here’s a list of must-have free risk assessment templates for CISOs:
1️⃣ NIST Cybersecurity Framework Risk Assessment Template – Aligns risks to NIST CSF categories for structured analysis.
https://www.nist.gov/cyberframework
2️⃣ CISA Risk Assessment Templates – Ready-to-use templates for critical infrastructure and IT systems.
https://www.cisa.gov/publication/cyber-essentials-risk-assessment
3️⃣ ISO/IEC 27005 Risk Assessment Template – Comprehensive framework for information security risk management.
https://www.iso.org/standard/75281.html
4️⃣ SANS Security Policy Templates – Includes risk assessment worksheets for different business units.
https://www.sans.org/information-security-policy/
5️⃣ OWASP Risk Assessment Template – Focused on application and web security risks.
https://owasp.org/www-project-risk-assessment/
6️⃣ ISACA Risk IT Templates – Aligns IT risk with business objectives and compliance requirements.
https://www.isaca.org/resources
7️⃣ Cloud Security Alliance (CSA) Cloud Controls Matrix – Template for assessing cloud service provider risks.
https://cloudsecurityalliance.org/research/
Using these templates allows CISOs to standardize assessments, communicate risk effectively to stakeholders, and prioritize mitigation strategies.
Want to see how human factors impact risk beyond technology? 🧠 AUMINT.io provides social engineering simulations that highlight hidden vulnerabilities in your organization.
📅 Book a free intro call: Schedule here
💾 Save this post and start streamlining your risk assessments today!
#CISO #RiskAssessment #CyberSecurity #InfoSec #HumanRisk #AUMINT