AUMINT.io Blog

 

Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources

Why is diversity important for cybersecurity teams?

When you picture a cybersecurity professional, what do they look like? According to statistics, 62% of computer science professionals (including cybersecurity) are white, and 76% are men. Of course, making sure you have qualified people working for you is important,...

6 cybersecurity predictions for 2023

2022 was a tough year in cybersecurity, with global attacks in Q4 increasing 28% compared to 2021. The threat landscape is likely to continue evolving throughout 2023. Here are some of the cybersecurity predictions from the wider community to help you prepare for the...

7 of the biggest data breaches of 2022

Data breaches continued to affect all types of companies in 2022, and the average cost of these breaches was $4.35 million. The reputational damage caused by data breaches is also huge, and can be hard to recover from.  Here are seven of the biggest data breaches...

10 cybersecurity statistics from 2022

2022 showed that cyber attacks are becoming increasingly sophisticated and show no signs of slowing. Major multinational companies, such as Nvidia, Toyota and Kronos, as well as national governments including Costa Rica and Montenegro, all fell victim to ransomware...

Top cybersecurity trends from 2022

The cybersecurity threat landscape changes quickly, with ransomware, supply chain exploits, multi-vector attacks and others increasing and becoming more sophisticated. In response, security teams need to evolve quickly to stay ahead, and over the last year we’ve seen...

Recent Bite-Size Posts

Is multifactor authentication enough?

Whilst multifactor authentication (MFA) is better than single-factor authentication (i.e., only a username and password), cybercriminals are finding ways to bypass it making it less secure than many think.  And there have been some high profile cases where criminals...

4 key payments ecosystem threats to look out for

The payments ecosystem has always had to consider cybersecurity carefully, but since the rapid expansion of digital payments (thanks, in part to the pandemic), it’s become critical. Particularly as cybercriminals and hackers have also become more sophisticated in...

Could your suppliers be your biggest security risk?

Ensuring the security of your own network, and making sure you have systems and processes in place to minimise the risk of cyber attacks is crucial. But what about your suppliers? If they don't take the same precautions, they could make your business vulnerable. ...

How Slack can help hackers break into your systems

Whilst Slack can be a great collaboration tool, especially for remote teams, there are a number of vulnerabilities that IT security teams need to be aware of. And several recent high profile hacks highlight this. EA Games hack For example, in 2021 hackers were able to...

Common NFT scams to look out for

As non-fungible tokens (NFTs) become more popular, it opens up new opportunities for online criminals. If you’re new to NFTs, below are some of the most common scams to be aware of. But first… What are NFTs? An NFT is a unique digital identifier that is recorded on...

How crackable are your company passwords?

Everyone knows the importance of creating a really strong password to make it more difficult for hackers to break into your systems. This is particularly important for systems that might house confidential information, such as customer data or corporate secrets. But,...

How to spot a deepfake

As deepfakes become more sophisticated and better quality, they can pose a real threat to your business. For example, they can be used by scammers to impersonate someone your employees trust - such as the company’s CEO or CFO - as a way of getting money or...

Phishing for everyone – Webinar – 29/9/2022

We opened a dedicated webinars mailing list.The only emails you'll get there are Announcements on webinars and recordings.We won't spam you (or phish you) in any way, and we won't share your email address with anyone. * indicates required Email Address * Name Phone...

3 of the biggest ransomware attacks of 2022

Ransomware attacks are unfortunately an evolving risk for companies, large and small. In some ways, they are like biological viruses because they change, adapt and continue to do damage over time. That damage includes anything from causing chaos by blocking access to...

How hackers use LinkedIn for social engineering

LinkedIn is a great networking platform for professionals across all industries. However, it can give hackers insight into your work and your company, and arm them with information they can use to manipulate you into giving away company secrets.  Why would hackers...

5 common crypto scams to look out for

Cryptocurrency (crypto) crime is on the rise. 2021 alone saw a record-breaking $14bn of crypto stolen by fraudsters. And because it’s an industry that isn’t regulated, like the traditional investment and banking sector, it’s really up to the individual to protect...

How much is your data worth to hackers?

Data breaches have become more common lately. And whilst sometimes the motivation for stealing data can be to embarrass major companies, or to gather data for espionage, the most common reason for stealing data is to make money. In fact, 86% of data breaches are about...

See how the Hacker sees you

Get your FREE Exposure Report NOW
Get the report