In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

Manufacturing’s Hidden Cybersecurity Crisis – How to Stay Ahead

🚨 Manufacturing Faces Escalating Cyber Risks

💡 Cyberattacks on manufacturing are increasing in frequency and severity, targeting production, supply chains, and IP.

⚠️ Downtime, regulatory penalties, and reputational damage make these breaches more than just financial losses.

🔍 Human factors remain the weakest link – social engineering and insider threats bypass traditional security measures.

🔥 Proactive, human-focused solutions are critical to detect vulnerabilities before attackers exploit them.

👥 AUMINT Trident simulates real-world social engineering attacks, providing actionable insights and ongoing training to strengthen your human firewall.

📅 Don’t wait for the next breach – protect your operations now: https://calendly.com/aumint/aumint-intro
.

#CISO #CyberSecurity #ManufacturingSecurity #SocialEngineering #FraudPrevention #HumanFactor #OperationalTechnology

read more

🖥 Free Browser Isolation Tools Changing Security Overnight 🖥

Browser isolation has quietly become one of the most effective defenses against phishing, drive-by malware, and malicious scripts. The best part? You don’t always need to pay enterprise prices to start testing it.

Here are free or open-source browser isolation tools CISOs should know:

1️⃣ Bromite – A Chromium-based browser with built-in ad/JS blocking and strong isolation controls.
🔗 https://www.bromite.org

2️⃣ Qubes OS Disposable VMs – Open-source OS where every browser session runs in an isolated VM.
🔗 https://www.qubes-os.org

3️⃣ Firejail – Linux sandboxing utility to run Firefox/Chromium in hardened isolation.
🔗 https://firejail.wordpress.com

4️⃣ Whonix with Tor Browser – VM-based browser isolation that anonymizes and separates browsing activity.
🔗 https://www.whonix.org

5️⃣ OpenBSD unveil/pledge (with Firefox/Chromium) – Security frameworks to restrict what the browser can access.
🔗 https://www.openbsd.org

6️⃣ Island (Community Edition) – App and browser isolation for mobile endpoints.
🔗 https://island.oasisfeng.com

7️⃣ Browser in a Box (by Sirrix/BSI) – Open-source hardened virtualization of browser sessions.
🔗 https://www.sirrix.com

⚡Takeaway: CISOs don’t need million-dollar budgets to reduce browser-borne risks. Starting with free browser isolation is like giving your endpoints a hazmat suit.

At AUMINT.io, we go further – simulating the exact phishing lures and malicious links attackers use to test if employees would click in the first place. Because isolation helps, but awareness changes outcomes.

🔗 Want to see how your employees handle simulated browser-borne attacks? Book a free demo

#BrowserIsolation #CyberSecurity #CISO #ThreatPrevention #AUMINT

read more

Workday Data Breach Exposes Risks of Social Engineering Attacks

🚨 Workday Breach Reveals Human Layer Risks

💡 Attackers bypassed technical defenses by exploiting employee trust through social engineering.

⚠️ Credentials and sensitive HR data were compromised, demonstrating that even cloud platforms are vulnerable.

🔍 The attack shows humans are still the weakest link in cybersecurity, despite robust technical safeguards.

📊 Social engineering tactics are evolving, personalized, and increasingly hard to detect.

🔥 Continuous simulations and real-time monitoring can transform employees into a strong human firewall.

👥 AUMINT Trident provides realistic attack simulations, actionable insights, and recurring training to mitigate risks.

📅 Don’t wait for the next breach – secure your human layer now: https://calendly.com/aumint/aumint-intro
.

#CISO #CyberSecurity #SocialEngineering #FraudPrevention #HumanFactor #RiskManagement #EnterpriseSecurity

read more