United States Reported Less Data Breaches in 2020 but with much more Expensive Successful Hacker Attacks

 

According to the annual report of the Identity Theft Resource Center (ITRC), 1,108 cyber incidents were reported in 2020 and the number casualties from these incidents was close to 301 million people, a drop of 66% over the previous year.

 

The social engineering technique of impersonation also helped attackers reap massive profits:

 

The volume of business fraud and hacking by corporate e-mail systems (BECs) reported to the FBI in 2020 was US$ 1.8 Billion – a figure that reflects half of all cyber damage in monetary terms.

 

“The trend away from mass data breaches and toward more precise and sophisticated cyberattacks doesn’t mean businesses can relax. Just the opposite. They need to learn whole new ways of protecting their data.”

– James E. Lee, ITRC COO

Read more about Examples and Numbers of Social Engineering Hacker Attacks  ›

 

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

AI-Powered Social Media Scams Fueling Targeted Email Attacks

🚨 AI-Driven Social Media Scams Are Targeting Employees

💡 Cybercriminals are now using AI to analyze social media activity, crafting hyper-personalized phishing emails that bypass traditional security measures.

⚠️ These attacks mimic tone, style, and interests, making them incredibly convincing and difficult to spot.

🔍 Human behavior is the primary vulnerability – one click or download can compromise networks.

🔥 AUMINT Trident simulates real-world social engineering attacks, helping organizations identify weaknesses and train employees to respond effectively.

📅 Protect your organization before attackers exploit human vulnerabilities: https://calendly.com/aumint/aumint-intro
.

#CISO #CyberSecurity #SocialEngineering #FraudPrevention #HumanFactor #AIThreats #EmployeeAwareness

⚡ Free Vulnerability Prioritization Tools That Save CISOs Time ⚡

Thousands of vulnerabilities hit every year – but not all deserve your team’s immediate attention. The real challenge for CISOs is knowing which ones matter most, right now. Here are free tools that help cut through the noise and focus on what’s critical:

1️⃣ EPSS (Exploit Prediction Scoring System) – Prioritizes based on likelihood of exploitation in the wild.
🔗 https://www.first.org/epss/

2️⃣ CISA KEV Catalog – Free authoritative list of vulnerabilities actively exploited by adversaries.
🔗 https://www.cisa.gov/known-exploited-vulnerabilities-catalog

3️⃣ Vulners.com – Aggregates threat intelligence, exploits, and vulnerability data with prioritization insights.
🔗 https://vulners.com

4️⃣ Qualys TruRisk Free Tier – Helps identify and prioritize vulnerabilities by risk scoring.
🔗 https://www.qualys.com/trurisk/

5️⃣ OpenVAS (via Greenbone) – Vulnerability scanner with reporting that supports prioritization workflows.
🔗 https://www.greenbone.net

6️⃣ Kenna EPSS Explorer (Free) – Combines CVEs with EPSS data for prioritization dashboards.
🔗 https://risk.io/labs

7️⃣ VulnCheck Free Portal – Provides exploit intelligence to identify which CVEs are weaponized.
🔗 https://vulncheck.com

💡 Takeaway: Patch everything is not a strategy. These free tools let CISOs patch smart, focusing resources on the vulnerabilities most likely to be used in attacks.

At AUMINT.io, we help CISOs go further – by simulating how attackers actually exploit overlooked human and technical gaps, then providing data-driven insights to prioritize awareness and defenses.

🔗 Curious how your org would rank if attackers targeted your employees first? Book a free demo

#VulnerabilityManagement #CISO #CyberSecurity #ThreatPrioritization #AUMINT

The Rising Threat of Phishing – How Clever Scammers Exploit Trust

🚨 Phishing Attacks Are Getting Smarter

💡 Recent campaigns targeting Booking.com users demonstrate how attackers exploit trust and familiarity to steal credentials.

⚠️ Personalized emails referencing recent bookings make it nearly impossible to distinguish legitimate communications from malicious ones.

🔍 Human behavior remains the primary vulnerability – clicking links or providing credentials opens doors for attackers.

🔥 AUMINT Trident simulates real-world phishing attacks, providing insights and ongoing training to strengthen your human firewall.

📅 Don’t wait until it’s too late – protect your workforce and sensitive data now: https://calendly.com/aumint/aumint-intro
.

#CISO #CyberSecurity #SocialEngineering #FraudPrevention #HumanFactor #EmployeeAwareness #Phishing