Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
π CISOs: Free Cybersecurity Metrics Dashboards to Track Right Now π
As a CISO, you’re judged by how well you measure and communicate risk. But building dashboards from scratch or paying for pricey platforms isnβt always feasible.
Good news: there are powerful free cybersecurity dashboards you can start using or adapting today to track what matters most β from phishing response times to endpoint health and user risk.
Hereβs a curated list of must-know dashboards and templates:
1οΈβ£ Microsoft Security Dashboard (via M365 Defender) β Visibility into threats, secure score, and incidents.
https://security.microsoft.com/securityoperations
2οΈβ£ Google Chronicle Security Dashboard (Free Tier) β SIEM-like visibility with integrated threat context.
https://cloud.google.com/chronicle
3οΈβ£ Splunk Security Essentials β Prebuilt dashboards for SOC maturity, MITRE mapping, and detection coverage.
https://splunkbase.splunk.com/app/3435/
4οΈβ£ Grafana + OSQuery Dashboards β Visualize endpoint queries across your fleet.
https://grafana.com/grafana/dashboards/12633-osquery-monitoring/
5οΈβ£ MITRE D3FEND Matrix Dashboards β Visual guide to map defense techniques against known threats.
https://d3fend.mitre.org/
6οΈβ£ Elastic Security Dashboards (via ELK Stack) β Open-source option for visualizing threat and event data.
https://www.elastic.co/security
7οΈβ£ Wazuh Dashboards (via Kibana) β Security analytics dashboard tailored to endpoint data and compliance events.
https://documentation.wazuh.com/current/user-manual/kibana-app/index.html
These dashboards help CISOs turn raw data into strategic conversations with boards, execs, and security teams.
Want to go beyond metrics and test real-world human risk? AUMINT.io simulates social engineering attacks and gives you trackable, CISO-level metrics on employee behavior.
π Ready to see AUMINTβs impact dashboards? Book a free intro call
π Save this post and start making metrics work for you, not against you.
#CISO #CyberSecurityMetrics #Dashboards #SecurityAnalytics #AUMINT