In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Agentic AI – The Next Frontier in Social Engineering Attacks
🚨 Agentic AI Is Revolutionizing Social Engineering Threats
💡 Cybercriminals are using autonomous AI to craft highly personalized attacks that act and adapt without human intervention.
⚠️ These attacks mimic tone, context, and communication style, making them extremely convincing and difficult to detect.
🔍 The human factor remains the weakest link – one misstep can compromise entire networks.
🔥 AUMINT Trident simulates agentic AI attacks in real-world scenarios, providing insights to strengthen employee awareness and organizational resilience.
📅 Protect your team from AI-powered manipulations before it’s too late: https://calendly.com/aumint/aumint-intro
.
#CISO #CyberSecurity #SocialEngineering #FraudPrevention #AIThreats #HumanFactor #EmployeeAwareness
🔒 9 Free Encryption Tools CISOs Trust with Sensitive Data 🔒
Protecting sensitive data is a top priority for CISOs – but strong encryption doesn’t have to come with a big price tag. Here are 9 trusted free encryption tools that help secure files, communications, and endpoints:
1️⃣ VeraCrypt – Open-source disk encryption for full volume and container protection.
🔗 https://www.veracrypt.fr/en/Home.html
2️⃣ GnuPG (GPG) – Encrypt emails, files, and communications with open-source public-key cryptography.
🔗 https://gnupg.org/
3️⃣ OpenSSL – Toolkit for SSL/TLS encryption, certificate generation, and secure communications.
🔗 https://www.openssl.org/
4️⃣ AxCrypt – Free file encryption with secure password management for individuals and small teams.
🔗 https://www.axcrypt.net/
5️⃣ BitLocker (Windows Free Edition) – Full-disk encryption built into Windows Pro editions.
🔗 https://learn.microsoft.com/en-us/windows/security/information-protection/bitlocker/
6️⃣ Cryptomator – Open-source encryption for cloud storage files and folders.
🔗 https://cryptomator.org/
7️⃣ KeePassXC – Open-source password manager with strong encryption for credentials.
🔗 https://keepassxc.org/
8️⃣ OpenSSH – Secure shell and encrypted file transfer for remote systems.
🔗 https://www.openssh.com/
9️⃣ 7-Zip – File archiver with AES-256 encryption for secure storage and transfer.
🔗 https://www.7-zip.org/
⚡ These tools help CISOs secure endpoints, emails, cloud data, and communication channels without licensing overhead.
At AUMINT.io, we complement these technical defenses by simulating human-targeted attacks, ensuring your employees understand encryption importance and don’t create accidental leaks.
🔗 Want to see where your human layer could undermine your encryption strategy? Book a free demo
#CISO #Encryption #CyberSecurity #DataProtection #AUMINT
AI-Powered Social Media Scams Fueling Targeted Email Attacks
🚨 AI-Driven Social Media Scams Are Targeting Employees
💡 Cybercriminals are now using AI to analyze social media activity, crafting hyper-personalized phishing emails that bypass traditional security measures.
⚠️ These attacks mimic tone, style, and interests, making them incredibly convincing and difficult to spot.
🔍 Human behavior is the primary vulnerability – one click or download can compromise networks.
🔥 AUMINT Trident simulates real-world social engineering attacks, helping organizations identify weaknesses and train employees to respond effectively.
📅 Protect your organization before attackers exploit human vulnerabilities: https://calendly.com/aumint/aumint-intro
.
#CISO #CyberSecurity #SocialEngineering #FraudPrevention #HumanFactor #AIThreats #EmployeeAwareness