In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

🖥️ CISOs: 10 Free Tools to Improve Your Endpoint Security Posture 🖥️

Your endpoints are your front lines – but securing them doesn’t have to break your budget.

Whether you’re dealing with BYOD chaos or hybrid work exposure, the right free tools can harden your defenses fast.

Here’s a curated list of 10 powerful, no-cost tools every CISO should consider for better endpoint security:

1️⃣ Microsoft Defender for Endpoint (Free Tier) – Baseline protection for Windows environments with solid detection capabilities.
https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint

2️⃣ OSQuery – Monitor endpoint state in real time using SQL-like queries across platforms.
https://osquery.io/

3️⃣ CrowdStrike Falcon Sensor (Free Trial) – Lightweight and fast EDR tool to test in small environments.
https://www.crowdstrike.com/

4️⃣ Kaspersky Virus Removal Tool – Free emergency scanner for deep threat cleaning.
https://www.kaspersky.com/downloads/thank-you/free-virus-removal-tool

5️⃣ Lynis – Audit and harden Linux-based endpoints with detailed security checks.
https://cisofy.com/lynis/

6️⃣ GRR Rapid Response – Incident response framework focused on remote live forensics.
https://github.com/google/grr

7️⃣ Cisco AMP for Endpoints (Trial) – Combines malware protection and analytics for deep insights.
https://www.cisco.com/c/en/us/products/security/amp-for-endpoints/index.html

8️⃣ Bitdefender Rescue CD – Offline malware removal for deeply infected systems.
https://www.bitdefender.com/support/how-to-create-a-bitdefender-rescue-cd-627.html

9️⃣ Traccar – Open-source GPS tracking software for mobile endpoint visibility and device control.
https://www.traccar.org/

🔟 Wazuh Agent – Collects logs and monitors endpoint integrity within a broader SIEM ecosystem.
https://documentation.wazuh.com/current/installation-guide/installing-wazuh-agent/index.html

These tools are especially useful for organizations with lean security budgets that still want maximum visibility, control, and response capability across diverse endpoints.

🧠 Want to surface human error risks before they lead to endpoint compromise? AUMINT.io lets CISOs simulate real-world social engineering attacks across teams: Schedule here

🛡️ Save this post and level up your endpoint defenses – no license fees required!

#CISO #EndpointSecurity #EDR #CyberSecurity #RemoteWorkSecurity #AUMINT

read more

Gamers Are Under Attack – Who’s Really Protecting Them?

🎮 Gamers Are Under Attack – Nobody’s Talking About It

👀 Hackers are impersonating fellow players, streamers, and even dev teams to breach millions of gaming accounts.

🔓 Social engineering attacks are rapidly growing – especially targeting Gen Z gamers with poor cyber hygiene and platforms with weak internal defenses.

💸 And yes, there’s real money at stake – credentials, in-game purchases, and sensitive data are being stolen daily.

🚨 Gaming companies often ignore social engineering training for their teams – thinking it’s a “user problem.”

🧠 But what if your staff is being targeted too?

🎯 AUMINT.io simulates social engineering attacks that mimic what’s really happening across gaming platforms – from fake support scams to deepfaked influencers.

💡 The result? Tailored awareness and behavior change for both employees and players.

🔄 One-time training is not enough. You need continuous testing, insights, and adaptive defenses.

🕹️ Want to see how attackers are really targeting your ecosystem?

Book a quick walkthrough – it might just save your platform from its next breach.

#GamingIndustry #CyberSecurity #CISO #CTO #CEO #SocialEngineering #GameDev #GameStudios #MFA #BehavioralSecurity #Infosec #CyberResilience #PlayerSafety

read more

🧠 CISOs: Top 10 Open-Source SIEM Solutions to Try for Free 🧠

Most SIEMs come with a hefty price tag – but did you know some of the most powerful options out there are 100% free and open-source?

If you’re building or optimizing your SOC on a lean budget, these tools can offer serious value without compromising visibility.

Here’s a handpicked list of 10 open-source SIEMs every CISO should consider:

1️⃣ Wazuh – Lightweight, scalable, and packed with threat detection, log analysis, and compliance capabilities.
https://wazuh.com/

2️⃣ TheHive Project – Incident response meets SIEM – great for managing complex investigations.
https://thehive-project.org/

3️⃣ Security Onion – Full Linux distro for threat hunting, IDS, and log analysis.
https://securityonionsolutions.com/

4️⃣ Graylog – Powerful centralized log management with excellent dashboards and alerting.
https://www.graylog.org/

5️⃣ SIEMonster – Built for scalability and based on multiple open-source tools like ELK and Wazuh.
https://siemonster.com/

6️⃣ Elastic SIEM (via ELK Stack) – Combine Elasticsearch, Logstash, and Kibana to visualize threats and trends.
https://www.elastic.co/siem

7️⃣ Apache Metron – Big data SIEM built on Hadoop – ideal for large-scale enterprise analysis.
https://metron.apache.org/

8️⃣ MozDef (Mozilla Defense Platform) – Created by Mozilla to automate incident response.
https://github.com/mozilla/MozDef

9️⃣ AlienVault OSSIM – The classic open-source SIEM with broad community support.
https://cybersecurity.att.com/products/ossim

🔟 Prelude OSS – Modular architecture for detection and correlation, great for custom setups.
https://www.prelude-siem.org/

These solutions offer incredible flexibility and insight when configured right – perfect for proactive teams that want to experiment, test, and deploy fast.

🔐 Want to add human vulnerability detection to your SIEM strategy? AUMINT.io helps CISOs run live social engineering simulations that surface gaps your logs can’t show: Schedule here

🛠️ Save this post and explore the future of SIEM without breaking your budget!

#CISO #SIEM #OpenSourceSecurity #ThreatDetection #SecurityOperations #AUMINT

read more