In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

AI Is Supercharging Phishing, Smishing, and Vishing Attacks – What You Must Know Now

⚠️ AI Is Powering Next-Gen Phishing, Smishing, and Vishing

🚨 AI automates ultra-realistic phishing emails that mimic your company’s style and timing.

📱 Smishing and vishing now use AI-crafted scripts and deepfake voices that fool even the wary.

⚠️ Static training and controls won’t keep up with AI-driven attackers learning from every attempt.

🔍 AUMINT.io combines AI analytics with real-time simulations to outsmart evolving social engineering attacks.

⏳ Don’t wait for the breach – future-proof your defenses today.

Secure your AI-powered defense now

#CyberSecurity #Phishing #AIThreats #SocialEngineering #AUMINT #ThreatIntelligence #CISO #SOC

read more

📊 Your Board Wants Metrics – Give Them Exposure Scores

Most security reports are too technical. Or too fluffy.

This isn’t that.

AUMINT’s Attack Surface Report delivers:
• Exposure score by severity
• Visual asset map
• Actionable next steps

Perfect for board briefings, risk reviews, and proving security ROI.

All for €1,500.

🎯 Book a report that speaks both CISO and CFO: https://calendly.com/aumint/aumint-intro

#CyberStrategy #BoardReporting #CISO #AttackSurface #SecurityROI #AUMINT

read more

AI in Cybersecurity: Weapon of Protection or Breach – Navigating the Paradox

🤖 AI Is Your Greatest Cyberweapon – Use Both Sides

🚨 Attackers use AI to launch deepfake scams, insider impersonation, and automated zero-day exploits.

🛡️ Defenders leveraging AI analytics detect anomalies 10x faster and contain attacks 6x quicker.

⚖️ The playing field tips in favor of whoever deploys AI more effectively.

📊 Dark Web findings show that those stuck in manual detection suffer stealthy breaches from intelligent threats.

🔍 AUMINT.io empowers teams with AI-powered behavioral analysis, tailored SOC workflows, and offensive readiness training.

✅ Don’t fight tomorrow’s threats with yesterday’s tools.

Activate your AI defense today

#AI #CyberSecurity #ThreatIntelligence #IncidentResponse #AUMINT #SOC #Defense #CISO #AIinSecurity

read more