In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Storm0501 Ransomware Exploits Azure Cloud Vulnerabilities
⚠️ Storm0501 Ransomware Hits Azure Cloud
Attackers are exploiting Azure cloud vulnerabilities with Storm0501 ransomware, encrypting data and demanding ransoms.
Organizations face severe disruption as backups and critical processes are targeted.
Cloud-specific weaknesses like misconfigured storage and weak authentication make these attacks more effective.
Human error remains a key vulnerability – even sophisticated clouds can be compromised if employees are unprepared.
AUMINT.io strengthens human defenses with simulations, tailored training, and dashboards to prevent ransomware escalation.
Secure your cloud environment and empower your team: Book Your AUMINT.io Intro
.
#CISO #CTO #CyberSecurity #CloudSecurity #EnterpriseSecurity #SocialEngineering #ITSecurity
AI-Powered Cyber Attacks Are Outpacing Your Defenses – Is Your Organization Ready?
🚨 AI Cyber Threats Are Already Inside Your Organization
Most organizations are unprepared for AI-driven cyberattacks.
86% of executives reported AI-related security incidents last year, yet only 4% of organizations can effectively defend against them.
Nearly half of employees use unsanctioned AI tools, and 60% of organizations cannot detect Shadow AI activities.
From identity management to endpoint reliability and cloud hardening, most companies are still in the early stages of implementing necessary protections.
These gaps leave your organization exposed to highly sophisticated AI-based attacks.
At AUMINT.io, we provide tailored simulations, employee training, and dashboards to strengthen defenses across all critical areas.
Ensure your team is ready – Book Your AUMINT.io Intro
today and safeguard your organization.
#CISO #CyberSecurity #AI #SocialEngineering #ITLeaders #TechExecs
DevSecOps and AI: Navigating Hidden Cyber Risks
🚨 AI in DevSecOps Can Hide Critical Security Risks
AI accelerates DevSecOps with automated testing and smarter code generation.
But hidden vulnerabilities and subtle errors can sneak in, creating the illusion of security.
Human oversight is crucial – social engineering and insider threats exploit AI-generated weaknesses.
AUMINT.io strengthens your human defenses with tailored simulations, ongoing awareness, and risk dashboards.
AI alone is not enough – human vigilance is your strongest safeguard: Book Your AUMINT.io Intro
.
#CISO #CTO #DevSecOps #CyberSecurity #EnterpriseSecurity #SocialEngineering