In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
🔐 Operational Technology Isn’t “IT’s Problem” Anymore
🧠 Operational Technology breaches begin in IT – but they end with physical disruption.
🏭 Power loss. Water tampering. Equipment malfunction.
📉 The line between cyber and physical is gone.
⚠️ That makes Operational Technology security a national safety issue – and a board imperative.
🛡️ AUMINT.io equips boardrooms with Operational Technology breach simulations and remediation roadmaps.
📆 See how it works: https://calendly.com/aumint/aumint-intro
💬 What cyber-physical convergence risks are you watching in 2025? 👇
🔎 #CyberPhysical #Operational TechnologySecurity #BoardLeadership #AUMINT
SMS: The Trojan Horse in Your Pocket Exploiting Human Weakness
📱 This Is the New Phishing Frontier You’re Ignoring
🚨 SMS-based social engineering is rising – and it works
⚠️ It’s not just spam – it’s weaponized trust in real-time
🎭 Attackers impersonate CEOs and colleagues in urgent, emotional texts
🤯 No firewall or AI tool can block a person tricked into believing a lie
📉 The risk? One message = one mistake = one breach
🔍 AUMINT.io simulates these real threats to prepare your team the right way
📊 With Trident, we recreate smishing attacks and analyze how your people respond
📈 Then we turn insights into targeted awareness that hardens your human layer
💥 Want to see how your team would handle a CEO text trap?
👉 Book your strategy call now
#Smishing #SocialEngineering #HumanRisk #PhishingAwareness #CyberTraining #CISOInsights #SecurityAwareness #SecurityCulture #InfoSecLeadership #CyberResilience
Why AI Alone Won’t Save You: Cybersecurity Fundamentals Still Win
🚨 AI Isn’t Your Security Strategy – Human Resilience Is
🧩 LLMs like ChatGPT can help, but they aren’t built to protect you
🛠️ If your fundamentals are weak, attackers will find a way in
🎯 Cybercriminals use AI to bypass tech by targeting humans
💡 No tool replaces critical thinking, phishing awareness, or deception detection
📉 Most teams still rely on outdated awareness training – that’s a big risk
📊 At AUMINT.io, we help CISOs build human cyber resilience that lasts
✅ With our Trident platform, your team faces real-world simulations – not theory
✅ You see exactly where human risk lies and how it evolves
🔐 Want to see how your team performs under pressure?
👉 Book your resilience check now
#HumanFirewall #SecurityAwareness #CISOInsights #PhishingProtection #CyberResilience #AIinCyber #LLMSecurity #RiskReduction #SecurityLeadership #SecurityOps #SecurityCulture #InfosecLeaders