In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

AI-Powered Cyber Attacks Are Outpacing Your Defenses – Is Your Organization Ready?

🚨 AI Cyber Threats Are Already Inside Your Organization

Most organizations are unprepared for AI-driven cyberattacks.

86% of executives reported AI-related security incidents last year, yet only 4% of organizations can effectively defend against them.

Nearly half of employees use unsanctioned AI tools, and 60% of organizations cannot detect Shadow AI activities.

From identity management to endpoint reliability and cloud hardening, most companies are still in the early stages of implementing necessary protections.

These gaps leave your organization exposed to highly sophisticated AI-based attacks.

At AUMINT.io, we provide tailored simulations, employee training, and dashboards to strengthen defenses across all critical areas.

Ensure your team is ready – Book Your AUMINT.io Intro
today and safeguard your organization.

#CISO #CyberSecurity #AI #SocialEngineering #ITLeaders #TechExecs

read more

DevSecOps and AI: Navigating Hidden Cyber Risks

🚨 AI in DevSecOps Can Hide Critical Security Risks

AI accelerates DevSecOps with automated testing and smarter code generation.

But hidden vulnerabilities and subtle errors can sneak in, creating the illusion of security.

Human oversight is crucial – social engineering and insider threats exploit AI-generated weaknesses.

AUMINT.io strengthens your human defenses with tailored simulations, ongoing awareness, and risk dashboards.

AI alone is not enough – human vigilance is your strongest safeguard: Book Your AUMINT.io Intro
.

#CISO #CTO #DevSecOps #CyberSecurity #EnterpriseSecurity #SocialEngineering

read more

Law Firms Under Siege – Why Cybersecurity Can No Longer Wait

⚖️ Law Firms: The Cybersecurity Wake-Up Call You Can’t Ignore

💡 Cybercriminals are treating law firms like open vaults – and the numbers prove it.

📂 Client contracts, financial data, and intellectual property are now the most lucrative targets, and attackers know firms often lag behind banks or tech companies in security.

📧 The most shocking truth? Hackers are bypassing technical defenses by exploiting people. Lawyers, partners, and staff are being hit with highly personalized phishing campaigns disguised as clients.

🔥 One breach can lead to millions in losses, reputational collapse, and shattered client trust. The legal industry is at the center of the storm – and many firms are unprepared.

🔑 The fix is not just firewalls or software updates. It is building a human shield through recurring awareness, simulations, and proactive defenses tailored to law firm workflows.

🚀 That is where AUMINT.io comes in. Our Trident platform simulates real-world attacks, trains teams to spot them, and delivers leadership dashboards that expose hidden risks.

📅 Ready to protect your firm’s credibility and client trust? Book your session today: https://calendly.com/aumint/aumint-intro
.

#CyberSecurity #LawFirms #DataProtection #FraudPrevention #CISO #ManagingPartners #LegalTech #BoardMembers

read more