In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

AI-Powered Attacks Are Disrupting Manufacturing – Here’s How to Stop Them

⚠️ AI Attacks Are Targeting Manufacturing Now

AI-driven cyberattacks are rapidly disrupting manufacturing operations.

Attackers exploit vulnerabilities across robotics, IoT, ERP, and supply chain systems, causing downtime and financial losses.

Traditional defenses are no longer enough against these adaptive, fast-moving threats.

AUMINT.io helps manufacturers stay ahead with simulations, real-time monitoring, and actionable insights to identify vulnerabilities before attackers exploit them.

Preparation is the difference between continuity and costly disruption.

Protect your operations today: https://calendly.com/aumint/aumint-intro

#CyberSecurity #ManufacturingSecurity #AIThreats #IndustrialCyberSecurity #CISO #AUMINT #OperationalResilience

read more

🚀 CISOs: Best Free Tools for Vulnerability Scanning 🚀

Vulnerability scanning is essential to uncover weaknesses before attackers do. You don’t need expensive software to get started — there are robust free tools that every CISO should know.

Here’s a curated list of top free vulnerability scanning tools:

1️⃣ Nmap – Network discovery and security auditing tool.
https://nmap.org/

2️⃣ OpenVAS (Greenbone Vulnerability Manager) – Full-featured vulnerability scanning and management platform.
https://www.greenbone.net/en/community-edition/

3️⃣ Nikto2 – Web server scanner that identifies outdated software and dangerous files.
https://github.com/sullo/nikto

4️⃣ Trivy – Vulnerability scanner for containers, Kubernetes, and cloud-native apps.
https://aquasecurity.github.io/trivy/

5️⃣ OWASP ZAP – Open-source web application security scanner.
https://www.zaproxy.org/

6️⃣ Lynis – Security auditing tool for Unix/Linux systems.
https://cisofy.com/lynis/

7️⃣ Clair – Static analysis for vulnerabilities in Docker and OCI images.
https://github.com/quay/clair

8️⃣ Wapiti – Web application vulnerability scanner for automated testing.
http://wapiti.sourceforge.net/

9️⃣ Vuls – Agentless vulnerability scanner for Linux and FreeBSD systems.
https://vuls.io/

🔟 Metasploit Community Edition – Penetration testing framework with vulnerability scanning capabilities.
https://www.metasploit.com/

Integrating these tools helps CISOs identify risks, prioritize remediation, and strengthen organizational security posture.

Want to see how human risk can compound vulnerabilities? 🧠 AUMINT.io simulates social engineering attacks to uncover employee behaviors that attackers exploit.

📅 Book a free intro call: Schedule here

💾 Save this post and start scanning smarter today!

#CISO #VulnerabilityManagement #CyberSecurity #ThreatDetection #AUMINT

read more

Ransomware Payments Skyrocket – Why Businesses Must Act Now

Ransomware attacks are intensifying at an alarming rate, with average ransom payments doubling in just a single quarter. This surge signals a dangerous trend – cybercriminals are becoming increasingly bold and sophisticated, targeting organizations that fail to proactively secure their systems.

The stakes are higher than ever. Businesses are not only losing critical data but also facing massive financial liabilities and reputational damage. Paying ransoms fuels this vicious cycle, encouraging attackers to strike again, often with more aggressive demands.

Traditional cybersecurity defenses are no longer enough. Firewalls, antivirus solutions, and basic backups cannot fully shield organizations from modern ransomware tactics, which include advanced social engineering, double extortion, and AI-enhanced attacks.

AUMINT.io equips organizations with proactive monitoring, attack simulations, and actionable insights to identify vulnerabilities before they can be exploited. By simulating real-world ransomware scenarios, security teams can pinpoint gaps in defenses, educate employees on risk behaviors, and implement measures that prevent attacks from succeeding.

The message is clear: ignoring the ransomware threat is no longer an option. Organizations that take decisive, informed action today can protect their assets, maintain business continuity, and deter attackers from targeting them in the first place.

Take action now and secure your organization’s future: https://calendly.com/aumint/aumint-intro🚨 Ransomware Costs Have Doubled This Quarter

Ransomware payments have surged, doubling in a single quarter.

Attackers are targeting unprepared organizations, leveraging advanced tactics and social engineering to extract huge sums.

The financial impact is devastating, but reputational damage and operational disruption can be even worse.

Traditional defenses like firewalls and antivirus software are no longer enough to stop modern ransomware threats.

AUMINT.io helps organizations stay ahead with proactive simulations, real-time monitoring, and actionable insights to prevent attacks before they happen.

Secure your systems and protect your business now: https://calendly.com/aumint/aumint-intro

#CyberSecurity #Ransomware #FraudPrevention #SocialEngineering #CISO #AUMINT #EnterpriseSecurity

read more