Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
π Free NIST Compliance Tools That Simplify Audits π
Meeting NIST standards can feel overwhelming, but several free tools help CISOs streamline audits and maintain compliance without expensive software.
Here are the top free NIST compliance tools:
1οΈβ£ NIST Cybersecurity Framework (CSF) Online Tool β Interactive tool to map controls and track maturity.
π https://www.nist.gov/cyberframework
2οΈβ£ CSET (Cyber Security Evaluation Tool) β NIST-based assessment tool to evaluate security posture.
π https://cset.nist.gov/
3οΈβ£ SP 800-53 Security Control Templates β Free Excel/Word templates for documentation and audit tracking.
π https://csrc.nist.gov/publications/sp800
4οΈβ£ OpenControl β Open-source framework to manage NIST and other compliance frameworks.
π https://www.opencontrol.org/
5οΈβ£ Vanta Free Resources β Guides and checklists for NIST CSF and audit prep.
π https://www.vanta.com/resources
6οΈβ£ ComplianceForge NIST Guides β Free guides and sample documentation for NIST 800-53 and CSF.
π https://www.complianceforge.com/free-resources
7οΈβ£ NIST 800-171 Assessment Templates β Helps organizations prepare for controlled unclassified information (CUI) compliance.
π https://csrc.nist.gov/publications/sp800
β‘ Takeaway: These tools help CISOs map controls, track gaps, and prepare for audits efficiently, saving hours of manual work.
At AUMINT.io, we pair technical compliance with human risk simulations, showing how employee behavior can affect NIST control effectiveness and overall security posture.
π Want to see how your human layer impacts compliance readiness? Book a free demo
#NISTCompliance #CISO #CyberSecurity #AuditTools #AUMINT