United States Reported Less Data Breaches in 2020 but with much more Expensive Successful Hacker Attacks

 

According to the annual report of the Identity Theft Resource Center (ITRC), 1,108 cyber incidents were reported in 2020 and the number casualties from these incidents was close to 301 million people, a drop of 66% over the previous year.

 

The social engineering technique of impersonation also helped attackers reap massive profits:

 

The volume of business fraud and hacking by corporate e-mail systems (BECs) reported to the FBI in 2020 was US$ 1.8 Billion – a figure that reflects half of all cyber damage in monetary terms.

 

“The trend away from mass data breaches and toward more precise and sophisticated cyberattacks doesn’t mean businesses can relax. Just the opposite. They need to learn whole new ways of protecting their data.”

– James E. Lee, ITRC COO

Read more about Examples and Numbers of Social Engineering Hacker Attacks  ›

 

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

Shadow IT and Zero Trust – Navigating the Next Wave of Chaos

💥 Shadow IT Is Breaking Zero Trust Faster Than You Think

🚨 In 2025, Shadow IT isn’t a side risk – it’s the chaos that undermines even the strongest cybersecurity frameworks.

🔒 Zero Trust sounds solid on paper – but if employees adopt tools outside approved channels, “never trust, always verify” loses its foundation.

👥 The surprising truth? Shadow IT is less about technology and more about human behavior. Employees turn to unsanctioned apps when official tools feel too slow or restrictive.

🎭 Attackers know this and exploit it – using fake portals, unauthorized logins, and social engineering tactics to steal access credentials hidden in plain sight.

📊 This is where proactive resilience matters. By simulating Shadow IT-driven attack scenarios and revealing where risks are highest, CISOs can finally close blind spots before criminals strike.

🚀 At AUMINT.io, our Trident platform was built for this reality – turning Shadow IT chaos into actionable visibility and strengthening people as the true frontline.

👉 Ready to see how to take back control? Book your introduction call today
.

#CISO #CTO #CEO #CyberSecurity #FraudPrevention #ShadowIT #ZeroTrust

Social Engineering Through Zoom – The Scam That Outsmarted Security Teams

📹 Zoom Calls Are the New Cybercrime Weapon

⚠️ A fake Zoom invite just fooled an entire security team. Attackers impersonated trusted partners, sending flawless invites that executives clicked without hesitation.

💡 Why did it work? Because employees are conditioned to trust meeting links – and attackers know it.

📊 The GK8 incident proves no company is immune. Even strong defenses crumble when attackers exploit human psychology instead of code.

🧠 This is the frontline of cybersecurity: the human factor. Firewalls and filters can’t stop a convincing Zoom call. Only recurring simulations and awareness training prepare employees to spot the trick before it’s too late.

🚀 That’s why AUMINT.io built Trident – to simulate attacks like fake invites and expose real vulnerabilities before criminals exploit them.

🔑 The biggest surprise? Social engineering is not a technical failure, but a behavioral one. That’s why prevention must focus on people, not just systems.

👉 Want to see how your team would handle a fake Zoom attack? Book your session here
.

#CISO #CTO #CEO #CyberSecurity #FraudPrevention #SocialEngineering #HumanRisk

The Raccoon Infostealer Takedown – A Win That Hides a Bigger Threat

🔥 Raccoon Infostealer Shut Down – But The Threat Isn’t Gone

⚡ Microsoft and Cloudflare dismantled the infrastructure behind the Raccoon infostealer, one of the most widely used malware families in recent years.

🔍 Raccoon thrived because it was sold as Malware-as-a-Service – allowing even low-skilled criminals to launch data theft campaigns in hours.

📈 The shutdown looks like a win, but history shows attackers quickly migrate to new tools, often more dangerous than the last.

💡 The real risk isn’t just the malware itself – it’s the human response to the social engineering tactics that deliver it.

✅ At AUMINT.io, our Trident platform helps companies prepare employees to resist these evolving attacks through recurring, real-world simulations.

📌 Want to ensure your workforce is ready for whatever replaces Raccoon? Book your AUMINT intro call
today.

#CISO #CIO #CEO #CyberSecurity #FraudPrevention #RiskManagement #BoardDirectors