AUMINT.io Blog

 

Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources

The latest browser-based social engineering trend

As governments and companies become aware of cyber threats and close the door on certain methods, cyber criminals are constantly evolving to find a new way to attack.  The latest example, according to a recent report by WatchGuard, is a new type of browser-based...

How is management prioritising cybersecurity in 2023?

Cybersecurity is becoming an increasingly important function within organisations, because the risk of not being prepared for an attack is now too high. Not only is there a higher likelihood of certain types of cyber attacks, but these types of threats are now seen as...

What is baiting and how to prevent it?

Baiting is a social engineering technique that cyber criminals use to lure victims by appealing to their greed or curiosity with a false promise. In the online world, this can take the form of an email telling you that you’ve won a competition or an advert offering...

International operation downs Qakbot malware infrastructure

A major digital sting operation, involving seven countries, resulted in the downing of a malware infrastructure that criminals have used to steal millions of dollars from their victims. The malware, Qakbot (also known as Qbot or Pinkslipbot) had been active since 2007...

Do demographic factors influence social engineering success?

Social engineering is one of the most successful tactics that cyber criminals can use to get access to confidential information or infiltrate company systems and networks. Its success depends on gaining trust. This is often done by using information that can be...

Recent Bite-Size Posts

5 of the most notable ransomware attacks in 2023

Now that we’re halfway through the year, it’s a good time to review the cybersecurity landscape, particularly around ransomware. Whilst the volume of ransomware attacks decreased by 23% in 2022 compared to 2021, there was ransomware resurgence in early 2023, with the...

3 ways generative AI can support cybersecurity

We recently looked at how generative AI, such as ChatGPT, is creating new cybersecurity challenges as it makes cybercrime more accessible. However, as with most new technology, it works both ways. Generative AI can also be leveraged by companies to enhance security....

How to prevent departing employees becoming insider threats

Insider threats are a growing concern for businesses globally. According to Gurucul’s 2023 Insider Threat report, 74% of organisations say insider attacks have become more frequent, and more than half have experienced an insider threat in the last year. As many major...

WhatsApp payments: How secure are they?

WhatApp recently launched an in-chat payment option in Singapore following successful roll-outs in both India and Brazil. And, given how widely used WhatsApp is, it’s likely that it will be launched in other regions in the future. However, there are security concerns...

3 cybersecurity challenges around hybrid working

Although some companies are requesting their staff to return to the office, it is unlikely that there will be a complete return to full-time office working. Today, in the US around 25% of work is done remotely - a 500% increase compared to 2019. And whilst hybrid...

4 of the most well-known crypto-ransomware

The use of crypto-ransomware - a specific type of malware that encrypts files on the victim’s computer until a ransom is paid - is on the rise. In 2022 alone, ​​organisations globally detected 493.33 million ransomware attacks. Below are some of the most well-known...

How to do cybersecurity on a budget

Businesses globally are going through a tough economic period and as a result, budgets are being cut. Cybersecurity can be one of the first departments to see cuts, as they don’t directly contribute to increasing revenues. However, given the cost of cybercrime is...

Crypto-ransomware vs doxware: What are the differences?

Hackers use a variety of malware to achieve their aims. And as they become more sophisticated, and techniques evolve to combine different types of attack strategies, it can be confusing to understand the differences between them. In this article, we’re going to look...

How is generative AI impacting cybersecurity?

Generative AI has been hitting the headlines recently with the release of ChatGPT at the end of 2022. And while it can be considered a useful tool for certain types of tasks, it is also posing a threat to companies, as hackers are using it to create more realistic...

Are your employees your biggest security threat?

Social media is now a part of everyday life. It’s impossible to avoid it these days. However, whilst posting about work successes or life events seems innocuous enough, this information can be used by hackers. In fact, social media data breaches accounted for 56% of...

Leaking-focused RaaS: a new type of threat?

Ransomware-as-a-Service (RaaS) has been growing in popularity with hackers as it makes extortion more accessible. Criminals don’t need to develop the ransomware themselves, instead, they can purchase it from certain ransomware groups who create it to sell via a...

Cryptomalware: What is it and is it on your computer?

Cryptomalware - also known as cryptojacking - is when attackers install undetectable malware on a victim’s computer in order to use their computing resources to mine cryptocurrency. With the popularity of all kinds of cryptocurrency surging, this type of attack is...

See how the Hacker sees you

Get your FREE Exposure Report NOW
Get the report