SolarWind’s Data Breach – Update
Some of the information stolen from the various companies after the hack into Solarwinds is now up for sale.
What’s on the shelf:
- Microsoft Information (Partial Source Code) for $ 600k
- Cisco Information (source code for some products) for $ 500k
- SolarWinds information (source code of the entire product) for $ 200k.
- FireEye Information (Red Team Assault Tool) for $ 50k.
Oh, and there is a sale … a package of all the above information for a million dollars.
WIIFM (What’s in it for me)
Beware: the next wave of ransomware and malware will not be recognized by antivirus which means that if you install it, the hackers will have 6 to 9 months of data
WSID2P (What should I do to protect)
Be aware. They are coming for you, and they’ll use any trick in the book for it.
Get informed and Start to protect your company now.
( Source: http://solarleaks.net/)
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Why Command and Control Channels Are the Silent Lifeline of Cybercriminals
🕵️ Hidden Lifelines: Why Command-and-Control Channels Matter Most
⚡ Every big cyberattack has a secret backbone – the command-and-control (C2) channel.
⚡ Once inside your network, compromised machines start “calling home,” awaiting attacker instructions. These hidden channels let hackers exfiltrate data, spread laterally, and trigger ransomware at scale.
⚡ The scary part? C2 traffic often looks like ordinary web requests or encrypted sessions. Attackers blend in with normal business activity to avoid detection.
⚡ And thanks to packaged frameworks, even low-skill attackers can now access powerful C2 tools.
⚡ Firewalls and antivirus alone cannot stop what appears legitimate. Detecting and disrupting C2 demands behavioral analytics and a human-aware workforce.
⚡ That’s where AUMINT.io’s Trident platform steps in – teaching employees how attackers plant the human entry points that fuel C2 control.
⚡ Ready to cut off the lifeline attackers depend on? Book your session today
.
#CISO #CTO #CFO #CEO #CyberSecurity #RiskManagement #FraudPrevention