AUMINT.io Blog

 

Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources

Five major cyberattacks of 2024

The number of cyberattacks has increased in recent years. Between April 2023 and March 2024, there was an 81% increase, and the types of companies now being targeted aren’t just major corporations. Cybercriminals are going after smaller ones too. They’re also...

A major ransomware attack on the NHS

Earlier in June, Synnovis, a pathology services provider to several of London’s NHS Trust hospitals was the victim of double extortion ransomware. According to one healthcare cybersecurity expert, “this is probably one of the most significant cyberattacks on the NHS”...

Hacktivists: what are they and why should you care?

Hacktivists are generally known to carry out cyberattacks for, what they perceive to be, the greater good of society. They’re a bit like the Robin Hoods of the internet. However, in recent years, the nature of hacktivism has changed and as such is potentially becoming...

How to choose a strong password

We’ve all been guilty of using weak passwords, or of using the same one for all our accounts - it's easier to remember. For some of you, this may still be the case. But doing this can make you vulnerable to attackers. More than 60% of internet users admit to using the...

6 cybersecurity tips to follow this summer

Summer is a time to take a relaxing break and enjoy some time away from the daily grind. However, this is something that hackers take advantage of. So, to make sure your stress-free break doesn’t turn into a holiday from hell, here are a few tips to help you be...

Recent Bite-Size Posts

Five major cyberattacks of 2024

The number of cyberattacks has increased in recent years. Between April 2023 and March 2024, there was an 81% increase, and the types of companies now being targeted aren’t just major corporations. Cybercriminals are going after smaller ones too. They’re also...

A major ransomware attack on the NHS

Earlier in June, Synnovis, a pathology services provider to several of London’s NHS Trust hospitals was the victim of double extortion ransomware. According to one healthcare cybersecurity expert, “this is probably one of the most significant cyberattacks on the NHS”...

Hacktivists: what are they and why should you care?

Hacktivists are generally known to carry out cyberattacks for, what they perceive to be, the greater good of society. They’re a bit like the Robin Hoods of the internet. However, in recent years, the nature of hacktivism has changed and as such is potentially becoming...

How to choose a strong password

We’ve all been guilty of using weak passwords, or of using the same one for all our accounts - it's easier to remember. For some of you, this may still be the case. But doing this can make you vulnerable to attackers. More than 60% of internet users admit to using the...

6 cybersecurity tips to follow this summer

Summer is a time to take a relaxing break and enjoy some time away from the daily grind. However, this is something that hackers take advantage of. So, to make sure your stress-free break doesn’t turn into a holiday from hell, here are a few tips to help you be...

Cyberattacks are on the rise in Europe

Since the Russian invasion of Ukraine in February 2022, the number of disruptive digital attacks within the European Union has increased. These are predominantly targeting election-related services and European infrastructure, and many have been traced to...

Cybercrime in the energy sector

Cyber attacks on the global energy industry have increased in recent years; between 2020 and 2022, the number of weekly cyberattacks more than doubled from 499 to 1101. And an attack on this sector can have far-reaching effects, perhaps more than any other industry....

Should weak passwords be banned?

Are you one of the millions of people still using “123456” as their password? According to password management company, NordPass, this has been used more than 4.5m times, and it takes less than 20 seconds to crack. But, in the UK, weak passwords will soon be a thing...

Social engineering hides a backdoor in plain site

A recent incident where a backdoor was introduced into XZ Utils’ open-source software in plain sight shows how effectively malicious actors can use social engineering for their own gains.  What is XZ Utils? XZ Utils is a set of free software command-line lossless data...

8 Cybersecurity predictions for 2024

Global technology research and consulting firm, Gartner, recently revealed their top eight cybersecurity predictions for the next few years. The way companies hire cybersecurity workers will change over the next few years as the adoption of generative AI will close...

Cybercrime in the manufacturing sector

One of the most targeted sectors for cybercrime globally is manufacturing. In 2023, it was the industry with the highest share of cyberattacks, encountering around 25% of the worldwide total. Of these, malware and ransomware were the top types of attack. The average...

End-to-end encryption: How secure is it?

As a security feature that comes with many messaging apps and data sharing software, end-to-end encryption is a way of making sure your communications and data is protected. However, is it as secure as we believe? What is end-to-end encryption? End-to-end encryption...

See how the Hacker sees you

Get your FREE Exposure Report NOW
Get the report