In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

When Hospitals Flatline: What the AMEOS Cyberattack Reveals About the Human Factor in Cybersecurity

🧠 Hospital Cyberattack Exposes Deadly Blind Spot

📉 Over 20 AMEOS facilities were digitally frozen in minutes.

📍 How? Not ransomware. Not brute force.
But humans.

🎯 Social engineering is the silent weapon that breached Germany’s hospital giant – not through firewalls, but through staff behavior.

⚠️ This attack exploited the timing of an internal IT shift – when stress, confusion, and change opened the door.

🛑 And what’s worse?
Most healthcare organizations would still fall for it today.

👥 Because while tech evolves, our human defenses remain outdated.

💡 AMEOS isn’t alone – it’s just the latest example of why cybersecurity starts with real-time, behavior-based awareness.

🔐 AUMINT Trident targets exactly this – tracking human risk, simulating social engineering attacks by role, and delivering auto-adaptive training based on how your team actually behaves.

📊 If you’re only measuring technical threats, you’re missing the real battleground.

👉 Book a 15-min intro call and learn how Trident closes your human exposure gaps.

#CyberSecurity #HealthcareIT #SocialEngineering #HumanRisk #CISO #CIO #HealthcareLeadership #MSSP #SecurityAwareness #AUMINT

read more

🛡️ CISOs: 12 Must-Have Free Tools for Vulnerability Management 🛡️

Vulnerability management isn’t just scanning and patching – it’s about having the right tools to prioritize, respond, and reduce real-world risk.

But with so many tools out there, where do you begin – especially with zero budget?

Here’s a handpicked list of 12 free tools every CISO should know for end-to-end vulnerability management:

1️⃣ OpenVAS – A powerful open-source scanner for identifying security issues.
https://www.greenbone.net/en/vulnerability-management/

2️⃣ Nessus Essentials – A trusted vulnerability assessment tool for small environments.
https://www.tenable.com/products/nessus/nessus-essentials

3️⃣ Nmap – Not just for port scanning – it’s great for discovering exposed services.
https://nmap.org/

4️⃣ Nikto2 – Web server scanning for dangerous files, configurations, and outdated software.
https://github.com/sullo/nikto

5️⃣ OSQuery – Query your infrastructure like a database for quick risk visibility.
https://osquery.io/

6️⃣ Lynis – A Unix security auditing tool for vulnerability and compliance checks.
https://cisofy.com/lynis/

7️⃣ Vulners – Vulnerability search engine that integrates with many scanners.
https://vulners.com/

8️⃣ Wapiti – Web app vulnerability scanner with crawler-style testing.
https://sourceforge.net/projects/wapiti/

9️⃣ Trivy – Container vulnerability scanner for Docker and Kubernetes setups.
https://aquasecurity.github.io/trivy/

🔟 Metasploit Framework – Pen-test toolkit to validate and exploit discovered vulnerabilities.
https://www.metasploit.com/

1️⃣1️⃣ Patch My PC – Keeps Windows endpoints updated automatically.
https://patchmypc.com/home-updater

1️⃣2️⃣ CVE Search – A simple tool to find, correlate, and filter known CVEs.
https://github.com/cve-search/cve-search

These tools let you spot what matters, validate risks, and act – fast.

Want to supercharge your vulnerability playbook with recurring employee-targeted attack simulations? 🧠 See how AUMINT.io helps CISOs uncover blind spots in real time: Schedule here

🔐 Save this post to upgrade your VM toolkit without spending a dime!

#CISO #VulnerabilityManagement #CyberSecurity #InfoSec #RiskReduction #AUMINT

read more

Web3’s Newest Bait: How Fake AI Platforms Are Hacking Human Trust

🧠 Hackers Are Now Weaponizing Fake AI Platforms

🚨 New social engineering attack targets curiosity – and it’s working.

🎯 These scams mimic legit Web3 AI tools – then hijack your wallet once connected.

⚠️ No red flags. No typos. No shady emails. Just realistic platforms and polished interfaces luring users to trust, click, and fall.

💥 It’s no longer phishing – it’s full-scale interface deception. And it’s scaling.

👨‍💻 Users are being tricked inside tools they believe are safe – from browser-based AI tools to crypto dashboards.

🔐 The future of phishing? It won’t come by email. It will come by app, dashboard, chatbot, or plugin.

🧠 Security teams must rethink how they train employees to detect deception.

At AUMINT.io, we simulate these advanced attack types – helping teams build real-world reflexes, not false confidence.

🛡️ Cyber resilience starts with realistic, evolving simulation – not check-the-box awareness.

📅 Curious to see it in action? Book a quick session and preview how AUMINT Trident handles real-world deception.

#CISO #CTO #CyberSecurity #Web3Security #AIThreats #SocialEngineering #FraudPrevention #SecurityAwareness #BlockchainRisk #SecurityTraining #PhishingSimulation

read more