In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
AI Dominates Cybersecurity Challenges: A Wake-Up Call
🚨 AI is outpacing humans in cybersecurity challenges.
🤖 In recent CTF competitions, AI teams ranked in the top 5% and 10%, surpassing thousands of human participants.
🔍 Tasks like application exploitation, reverse engineering, and cryptography were tackled with remarkable speed and accuracy.
⚠️ Yet, AI still faces challenges in creative problem-solving and contextual understanding.
🔐 The future of cybersecurity lies in the synergy between AI and human expertise.
💡 Stay ahead of the curve.
📅 Book a session with AUMINT.io
The Rising CISO: Bridging IT and OT Cybersecurity
🔐 CISOs Now Guarding OT Security
In 2025, over half of organizations now assign OT security to CISOs, up from 16% in 2022. This shift highlights the urgent need for integrated cybersecurity across IT and OT systems.
As OT networks become more connected to IT infrastructure, the potential impact of cyber threats on critical operations escalates. CISOs are now responsible for unifying defenses, leveraging AI-driven analytics, and implementing threat intelligence to prevent disruptions.
Organizations with integrated OT-IT security report up to a 93% reduction in incidents, demonstrating measurable results. Executives and security leaders must embrace this strategic change to safeguard critical assets and ensure operational continuity.
Future-proof your security posture – discover AUMINT.io solutions
.
#CISO #Cybersecurity #OperationalTechnology #ITSecurity #ExecutiveLeadership #EnterpriseRisk #AUMINT
The Human Factor in Cybersecurity 2025 – Why People Are the Weakest Link
🛡 Human Error: Cybersecurity’s Biggest Threat
Humans are the weakest link in 2025 cybersecurity. 😱
Cybercriminals exploit trust, urgency, and authority to bypass technical defenses. 💡
Generative AI has made attacks ultra convincing. Emails, messages, and even voice calls now mimic executives or familiar contacts perfectly. 🧠
Phishing and vishing campaigns trick employees into revealing credentials or approving fraudulent transfers. 💸
Even trained teams can fall victim because attackers combine psychology and tech to create believable scenarios. ⚠️
Organizations must focus on human-centric security. Multi-factor authentication, verification processes, and simulated social engineering exercises are essential. ✅
AUMINT.io helps businesses identify human vulnerabilities and strengthen defenses. Learn how to protect your teams and sensitive data by scheduling a session today here
.
#CISO #HR #ITSecurity #FraudPrevention #SocialEngineering #AUMINT #CyberAwareness #ExecutiveSecurity