In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
🔥 Hackers Exploit What You Don’t See. Are You Ready?
Most security tools scan your known assets.
But attackers look beyond — at forgotten servers, leaked credentials, and employee mistakes.
AUMINT’s €1,500 Attack Surface Report gives you the full picture.
See the invisible, fix the unseen.
🔗 Book your session: https://calendly.com/aumint/aumint-intro
#CyberThreats #CISO #SOC #AttackSurface #InfoSecEurope #CyberSecurity #AUMINT
Why EMEA Enterprises Are Prime Targets for Vendor Email Compromise
📧 Why EMEA Enterprises Face Higher VEC Risks
Vendor Email Compromise (VEC) is skyrocketing in EMEA, with 72% of employees at large enterprises engaging with suspicious vendor emails — that’s nearly double the engagement rate of Business Email Compromise (BEC) attacks.
Even more alarming? EMEA organizations report just 0.27% of VEC incidents, the lowest rate worldwide, leaving many attacks undetected and unresolved.
The telecom sector and junior sales staff are especially vulnerable, with engagement rates hitting 71% and 86% respectively.
This data reveals a troubling pattern: EMEA enterprises tend to trust vendor emails too easily, creating an entry point for costly cyber fraud.
Preventing VEC demands more than technology—it requires proactive employee training, awareness, and advanced AI-driven detection.
At AUMINT.io, we tailor cybersecurity defenses to EMEA’s unique challenges to stop VEC before it causes damage.
Take control of your security today.
Book a Consultation with AUMINT.io
#Cybersecurity #VEC #EMEA #EmailSecurity #ThreatIntelligence #CISO #SecurityAwareness
Your passwords might already be exposed without you knowing it.
Your passwords might already be exposed online today.
🔐 Many people don’t realize their passwords could be leaked and abused.
🕵️♂️ Trusted leak-checking services can quickly reveal if your critical passwords are at risk.
⚠️ Ignoring this leaves your accounts and sensitive data vulnerable to hackers – Check if your super secret bank password is out there:
➡https://haveibeenpwned.com/
➡https://howsecureismypassword.net/
➡https://spycloud.com/check-your-exposure
➡https://leakcheck.appspot.com/
➡https://monitor.firefox.com/
➡https://ghostproject.fr/
➡https://breachalarm.com/
📈 AUMINT.io trains teams to spot and prevent breaches before they happen.
📞 Ready to secure your passwords and your organization? Let’s talk.
#CyberSecurity #PasswordSecurity #DataBreach #InfoSec #AUMINTio