AUMINT.io Blog

 

Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources

How strong OSINT can be.

From Handle to Human: Unmasked “Rey” of Scattered LAPSUS$ Hunters Scattered LAPSUS$ Hunters (SLSH) emerged as one of the most disruptive cyber-extortion crews of recent years, blending social engineering, data theft, and public shaming campaigns against major global...

Beyond the Search Bar: Methodological OSINT in 2026

In the early days of Open-Source Intelligence (OSINT), the discipline was often defined by the "tool-first" mentality. Success was measured by the size of one’s bookmark folder or the obscurity of a specific Python script. However, as we move through 2026, the...

2026 Cyber Forecast: The Rise of “Super-Malware” and Deep Infrastructure Sieges

As we close out 2025, the threat landscape has shifted from opportunistic attacks to highly engineered, systemic campaigns. The final quarter of this year gave us two "canary in the coal mine" moments—the financial industrialization of GoldFactory and the deep...

Critical Alert: Sophisticated Impersonation Campaign Targets 150+ Organizations

As reported by the Microsoft Threat Intelligence Center (MSTIC), we are currently witnessing a new, high-volume wave of sophisticated spear-phishing attacks. This campaign marks a significant escalation in nation-state tradecraft for the 2026 threat landscape....

Prompt Engineering Your Family Christmas Dinner

A Survival GuideThe bird is roasting, the LEDs are twinkling, and you haven’t even hit the bottom of your first eggnog when the inevitable breach occurs. Uncle Bob flanks you, brandishing a fossilized iPad, and whispers the holiday curse: "Since you’re the computer...

Recent Bite-Size Posts

The 2020 US election: How fake news was used to influence people

Fake news was, unsurprisingly, a concern during the 2020 US presidential elections. Fake news is 70% more likely to be shared than real news and in the run up to the 2016 election, it accounted for 6% of all news.  Fake news about voter fraud was widely spread...

3 types of disinformation scams to look out for

Disinformation is prevalent online - particularly on social media - and is often designed to manipulate you into giving away something valuable. Here are three recent examples of how scammers have used disinformation. 1. Charity-based scams As we touched upon in a...

How scammers exploit fake news on social media

Social media offers many opportunities for scammers to make money. And, they have few concerns about exploiting tragedy. For example, the current war in Ukraine has seen many con artists asking for ‘donations’. TikTok makes it easier to spread fake news Whilst scams...

Why do you need more than password protection?

We all know that we have to use passwords to protect our accounts at home and work. But, on their own, how much protection do they offer? Many people reuse passwords or have multiple applications under one account (e.g., Google products).  Not you, of course,...

Four common WhatsApp scams and how to avoid them

WhatsApp is one of the most popular apps with over 2 billion users globally. So it’s no surprise that it’s become a target for fraudsters. In 2021 alone, 59% of Brits reported receiving a message-based scam, 13% of which were via WhatsApp.  Here are some common scams...

Don’t let remote working make you vulnerable

Business Email Compromise (BEC) is not new; however, fraudsters have changed their tactics in recent years. Rather than targeting C-suites and Executives, they’ve now cast their nets to the broader business ecosystem. And, the rise of home working has made their work...

Beware the deepfake con artists

Beware the deepfake con artists   From the fun Tom Cruise impersonation, to the more concerning fake Nancy Pelosi video, “deepfakes” have gained a lot of attention. But what are they and why could they be harmful to your business?   How are deepfakes made?...

HACKERS LOVE A BARGAIN

Why Hackers love bargin events and how to be protected?   Hackers love a bargain just as much as consumers do and the run up to Amazon Prime Day is a perfect opportunity to swindle. The hackers often use Scam Websites and Phishing campaigns to take advantage of...

What is Whaling and how to avoid it?

* This article is part of a sequel on Social Engineering Attack Types and how to avoid them. You can read our previous article about spear phishing, here:  (https://web.aumint.io/spearphishing-spear-phishing/). Whaling is a sophisticated and specifically targeted...

Spear Phishing

Perhaps you remember hearing about people getting requests from a Nigerian prince, a scam known as Phishing? Hackers spread wide nets, playing the numbers and hoping to take advantage of people's naivete and generosity. Today's hackers are far more sophisticated and...

See how the Hacker sees you

Get your FREE Exposure Report NOW
Get the report