AUMINT.io Blog

 

Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources

How strong OSINT can be.

From Handle to Human: Unmasked “Rey” of Scattered LAPSUS$ Hunters Scattered LAPSUS$ Hunters (SLSH) emerged as one of the most disruptive cyber-extortion crews of recent years, blending social engineering, data theft, and public shaming campaigns against major global...

Beyond the Search Bar: Methodological OSINT in 2026

In the early days of Open-Source Intelligence (OSINT), the discipline was often defined by the "tool-first" mentality. Success was measured by the size of one’s bookmark folder or the obscurity of a specific Python script. However, as we move through 2026, the...

2026 Cyber Forecast: The Rise of “Super-Malware” and Deep Infrastructure Sieges

As we close out 2025, the threat landscape has shifted from opportunistic attacks to highly engineered, systemic campaigns. The final quarter of this year gave us two "canary in the coal mine" moments—the financial industrialization of GoldFactory and the deep...

Critical Alert: Sophisticated Impersonation Campaign Targets 150+ Organizations

As reported by the Microsoft Threat Intelligence Center (MSTIC), we are currently witnessing a new, high-volume wave of sophisticated spear-phishing attacks. This campaign marks a significant escalation in nation-state tradecraft for the 2026 threat landscape....

Prompt Engineering Your Family Christmas Dinner

A Survival GuideThe bird is roasting, the LEDs are twinkling, and you haven’t even hit the bottom of your first eggnog when the inevitable breach occurs. Uncle Bob flanks you, brandishing a fossilized iPad, and whispers the holiday curse: "Since you’re the computer...

Recent Bite-Size Posts

What is Ransomware-as-a-Service (RaaS)?

The number of ransomware attacks have been increasing in recent years, and this is partly linked to the rise of Ransomware-as-a-Service. But what is it and how does it work? What is RaaS? Ransomware-as-a-Service (RaaS) is a subscription-based business model used by...

What the FBI’s take down of Hive means for ransomware attacks 

The FBI recently took down prolific ransomware group, Hive, preventing $130m being taken through attacks. How did this happen and what does it mean, if anything, for other ransomware groups? Who is Hive? Hive is a notorious ransomware group that has attacked more than...

Why is diversity important for cybersecurity teams?

When you picture a cybersecurity professional, what do they look like? According to statistics, 62% of computer science professionals (including cybersecurity) are white, and 76% are men. Of course, making sure you have qualified people working for you is important,...

6 cybersecurity predictions for 2023

2022 was a tough year in cybersecurity, with global attacks in Q4 increasing 28% compared to 2021. The threat landscape is likely to continue evolving throughout 2023. Here are some of the cybersecurity predictions from the wider community to help you prepare for the...

7 of the biggest data breaches of 2022

Data breaches continued to affect all types of companies in 2022, and the average cost of these breaches was $4.35 million. The reputational damage caused by data breaches is also huge, and can be hard to recover from.  Here are seven of the biggest data breaches...

10 cybersecurity statistics from 2022

2022 showed that cyber attacks are becoming increasingly sophisticated and show no signs of slowing. Major multinational companies, such as Nvidia, Toyota and Kronos, as well as national governments including Costa Rica and Montenegro, all fell victim to ransomware...

Top cybersecurity trends from 2022

The cybersecurity threat landscape changes quickly, with ransomware, supply chain exploits, multi-vector attacks and others increasing and becoming more sophisticated. In response, security teams need to evolve quickly to stay ahead, and over the last year we’ve seen...

When was the last time you did a cybersecurity audit?

You might have cybersecurity systems and processes in place, but are you reviewing them regularly to make sure you don’t have any holes in your network security, and to make sure you’re compliant with the latest security regulations? Here are some key things to...

5 tips for staying cyber secure this Christmas

Christmas and the holiday period gives malicious actors plenty of material to work with when developing realistic social engineering hacks. Here are some of the key things you need to keep an eye out for. 1. Make sure your social media profiles are private For social...

Top World Cup-related phishing attacks

Big events are always a target for phishing attacks, as it means there will be lots of people willing to pay a high price to ensure they don’t miss out on a ticket. This year’s football World Cup in Qatar is no different.  In the run-up to and during the...

Mitigating the impact of fake social media accounts

Whilst social media is a vital tool for brands to communicate with customers, companies need to consider the impact these platforms can have on their business. They hold the power to change the rules of engagement without warning, which can lead to unintended...

Could cybersecurity complacency be costing you?

Everyone knows that cybersecurity is important, particularly as cyber criminals are using increasingly sophisticated methods to hack into large company networks. But it can be frustrating when you can’t use a certain app that would make team communication easier, and...

See how the Hacker sees you

Get your FREE Exposure Report NOW
Get the report