AUMINT.io Blog

 

Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources

End-to-end encryption: How secure is it?

As a security feature that comes with many messaging apps and data sharing software, end-to-end encryption is a way of making sure your communications and data is protected. However, is it as secure as we believe? What is end-to-end encryption? End-to-end encryption...

Will quantum computing be a threat to cybersecurity?

As developments in quantum computing lead to greater computing power, many are concerned about its potential impact on cybersecurity. Whilst it will bring benefits, such as identifying and shutting down cyber attacks more quickly, the negative consequences could be...

How to respond to a double extortion attack

Ransomware attacks are on the rise and now, rather than simply demanding money in return for the release of a company’s data, many cybercriminals are deploying double or even multiple extortion attacks. Not only do they encrypt the victim company’s data, but they also...

Explainer: What is Volt Typhoon and what does it mean for your business?

Last month, the US government revealed that they had disrupted a cyber-spying operation by a Chinese state-sponsored cyber group called Volt Typhoon. The group has been active since 2021, and whilst there wasn’t a direct attack, it had installed malicious software...

Should cybersecurity be taught in schools?

As we live in an increasingly digital world - for both our personal and professional lives - children are required to immerse themselves in technology from a much younger age. However, they aren’t really equipped to deal with the dangers that present themselves...

Recent Bite-Size Posts

Ethical principles for AI in cybersecurity

The use of AI and machine learning (ML) is increasing across many industries, including cybersecurity. And whilst it can bring many benefits in helping professionals do their job of tackling increasingly complex cybersecurity threats, there are several problems that...

Retailers: Protect yourself (and customers) against cybercrime

As the holiday season approaches, people are beginning to think about shopping for gifts, so it’s a good time of year for retailers to consider how prepared they are for cybersecurity threats. Because, with more people spending money during this period - in 2022...

5 ways to recruit top cybersecurity talent

Having a good cybersecurity team is more essential than ever as cyber threats continue to increase. And, according to a recent ISACA report, 62% of businesses have understaffed cybersecurity teams. But, recruiting skilled cybersecurity professionals isn’t cheap,...

Disinformation and election interference in 2024

Next year is set to be a big year for elections, with 65 national-level ones taking place across 50 countries. In fact, between October 2023 and the end of 2024, 71% of people living in democracies will vote in an election. This has raised some concerns around how...

5 dangers of using generative AI

Generative AI, such as ChatGPT or Google's Bard, has revolutionised the way we work and use the internet. However there are some dangers that you need to be aware of to prevent it having a negative impact on your business.  1. Privacy Most generative AI tools are...

European Cybersecurity Month focuses on social engineering

Throughout the month of October, the EU holds their annual cybersecurity campaign which focuses on promoting cybersecurity among EU citizens and organisations. This is done through various activities including conferences, workshops, training and webinars.  This...

Are governments prepared for cyber attacks?

Private companies aren’t the only target for cyber criminals. As we’ve seen in the past with attacks to major public infrastructure, such as the Colonial Pipeline in the US in May 2021, and public services, like the Wannacry attack on the NHS in 2017, threat actors...

The latest browser-based social engineering trend

As governments and companies become aware of cyber threats and close the door on certain methods, cyber criminals are constantly evolving to find a new way to attack.  The latest example, according to a recent report by WatchGuard, is a new type of browser-based...

How is management prioritising cybersecurity in 2023?

Cybersecurity is becoming an increasingly important function within organisations, because the risk of not being prepared for an attack is now too high. Not only is there a higher likelihood of certain types of cyber attacks, but these types of threats are now seen as...

What is baiting and how to prevent it?

Baiting is a social engineering technique that cyber criminals use to lure victims by appealing to their greed or curiosity with a false promise. In the online world, this can take the form of an email telling you that you’ve won a competition or an advert offering...

International operation downs Qakbot malware infrastructure

A major digital sting operation, involving seven countries, resulted in the downing of a malware infrastructure that criminals have used to steal millions of dollars from their victims. The malware, Qakbot (also known as Qbot or Pinkslipbot) had been active since 2007...

Do demographic factors influence social engineering success?

Social engineering is one of the most successful tactics that cyber criminals can use to get access to confidential information or infiltrate company systems and networks. Its success depends on gaining trust. This is often done by using information that can be...

See how the Hacker sees you

Get your FREE Exposure Report NOW
Get the report