AUMINT.io Blog

 

Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources

Why cybersecurity teams need oversight of social media accounts 

These days, if your business doesn’t have a presence on social media - whether that’s Twitter, Facebook or LinkedIn - you’re missing a trick. It’s becoming a vital way to connect with customers. However, it also creates a vulnerability that you might not be...

“Europol ploy”: the latest phone scam in Europe

A new phone scam is on the rise in Germany and other parts of Europe in which scammers impersonate Europol officers to trick victims into transferring them money, vouchers or personal details. How does the scam work? First, you will receive a call with a recorded...

How AI can help turn the tables on scammers 

As cybercriminals become increasingly sophisticated with their scams, using artificial intelligence (AI) to scale up their operations, it can feel like fighting a losing battle. However, AI and machine learning (ML) can also be used against them. Here’s how: Detecting...

How to tell if you have ransomware

No business wants to become a victim of a ransomware attack. This is when data on your computer or network is held hostage until you pay a ransom. In most cases - particularly human-operated ransomware (as opposed to automated ransomware) - there will be warning signs...

Scammers don’t take summer holidays

Summer is when most people think about taking holidays and enjoying outdoor activities to make the most of good weather. But cyber criminals don’t take a break during this period. They have scams specifically for this season. Here are three to look out for: 1. Fake...

Recent Bite-Size Posts

“Europol ploy”: the latest phone scam in Europe

A new phone scam is on the rise in Germany and other parts of Europe in which scammers impersonate Europol officers to trick victims into transferring them money, vouchers or personal details. How does the scam work? First, you will receive a call with a recorded...

How AI can help turn the tables on scammers 

As cybercriminals become increasingly sophisticated with their scams, using artificial intelligence (AI) to scale up their operations, it can feel like fighting a losing battle. However, AI and machine learning (ML) can also be used against them. Here’s how: Detecting...

How to tell if you have ransomware

No business wants to become a victim of a ransomware attack. This is when data on your computer or network is held hostage until you pay a ransom. In most cases - particularly human-operated ransomware (as opposed to automated ransomware) - there will be warning signs...

Scammers don’t take summer holidays

Summer is when most people think about taking holidays and enjoying outdoor activities to make the most of good weather. But cyber criminals don’t take a break during this period. They have scams specifically for this season. Here are three to look out for: 1. Fake...

Why does fake news go viral so quickly?

Fake news is nothing new but, since the rise of social media, it’s become more prolific and spreads faster. In fact, fake news stories are 70% more likely to spread than real news. Why is that? Fake news travels faster than true news Numerous recent studies have shown...

Is your personal data being sold on the dark web?

Data breaches, including large scale ones where company databases are hacked, are not uncommon. There have been at least four in 2022 alone, leaking the records of more than 8m people. That means your personal details could be out there for scammers to exploit. Why do...

5 ways AI is being used by scammers

Artificial Intelligence (AI) has many benefits. It can help us do our work - especially boring, repetitive tasks - more quickly and efficiently. But, it also helps scammers do their work better too. Here are five ways that hackers are using AI. 1. Bypassing CAPTCHAs...

A new WhatsApp scam enables account hijacking

A new WhatsApp OTP (one-time password) hack has just been identified in India which enables scammers to takeover users’ accounts via a phone call. Whilst scams targeting WhatsApp are nothing new, this one takes advantage of external call forwarding services.  How does...

Why “liveness tests” can be vulnerable to attack

To prevent fraud, companies are looking at increasingly sophisticated methods to verify customers’ identities. “Liveness tests” are one way of doing this, but it seems that even these are vulnerable to attack.  What are “liveness tests”? “Liveness tests” are used by...

5 ransomware trends to look out for 

Ransomware attacks are on the rise. According to a report by AV-TEST, the amount of malware has reached a new high, with over 150m harmful programme variants identified. And the risk of stolen data being released due to ransomware attacks increased from 8.7 percent in...

The growing trend of current event-based phishing hacks

You might think you can spot a phishing email a mile off. But gone are the days of “Nigerian princes” asking you to wire them money. Hackers have become more sophisticated in their techniques. Their new tactics are clearly working as, according to CISCO’s 2021...

See how the Hacker sees you

Get your FREE Exposure Report NOW
Get the report