United States Reported Less Data Breaches in 2020 but with much more Expensive Successful Hacker Attacks
According to the annual report of the Identity Theft Resource Center (ITRC), 1,108 cyber incidents were reported in 2020 and the number casualties from these incidents was close to 301 million people, a drop of 66% over the previous year.
The social engineering technique of impersonation also helped attackers reap massive profits:
The volume of business fraud and hacking by corporate e-mail systems (BECs) reported to the FBI in 2020 was US$ 1.8 Billion – a figure that reflects half of all cyber damage in monetary terms.
“The trend away from mass data breaches and toward more precise and sophisticated cyberattacks doesn’t mean businesses can relax. Just the opposite. They need to learn whole new ways of protecting their data.”
– James E. Lee, ITRC COO
Read more about Examples and Numbers of Social Engineering Hacker Attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Storm-2657 Payroll Pirate Attacks Expose University HR Risks
🚨 Storm-2657 Payroll Pirates Target Universities
Microsoft warns of attacks hijacking employee accounts to steal salaries.
💡 HR SaaS platforms like Workday are being exploited with phishing and MFA bypass.
👥 Attackers use AiTM phishing links, enroll their own MFA devices, and hide email notifications to reroute payroll.
⚡ 11 accounts compromised across three universities sent phishing emails to nearly 6,000 targets.
✅ Adopt phishing-resistant MFA like FIDO2 keys.
✅ Review accounts for unknown MFA devices and malicious inbox rules.
✅ Educate staff to recognize phishing tactics.
AUMINT.io helps organizations detect hidden gaps through simulations and continuous monitoring – Book your session now
.
#CyberSecurity #MFA #Phishing #PayrollSecurity #HigherEducation #MicrosoftSecurity
Corporate Social Media Accounts – Hidden Risks You Can’t Ignore
🚨 Corporate Social Media – Your Hidden Security Threat
Marketing teams often control accounts, not IT.
💡 Shared credentials and disabled MFA leave dormant accounts open to attacks.
⚡ Attackers can post offensive messages, redirect ad spend, or distribute malware.
👥 MFA bottlenecks and social engineering create human factor vulnerabilities.
✅ IAM/IGA tools like Cerby centralize access, enforce MFA, and rotate passwords.
✅ Continuous monitoring prevents ghost accounts and unauthorized posts.
AUMINT.io simulates attacks and uncovers hidden risks before damage occurs – Book your session now
.
#CyberSecurity #SocialMediaSecurity #FraudPrevention #BrandProtection #CISO #ITSecurity
The Neighbor Attack – A New Cyber Threat You Didn’t See Coming
🔐 Neighbor Attack – Your Office Wi-Fi Could Be the Weak Link
🚨 A new cyber threat has emerged, exploiting the proximity of neighboring offices to infiltrate secure networks.
🕵️♂️ Attackers gain access to a neighboring office’s network, bridging the gap to your organization’s Wi-Fi, bypassing MFA protections.
💡 This highlights a critical oversight in traditional cybersecurity measures – assuming physical proximity doesn’t equate to network vulnerability.
🔒 Implementing strict network segmentation and continuous monitoring are essential defenses against such threats.
📊 AUMINT.io provides real-time threat detection and comprehensive security analytics to protect your organization from emerging cyber threats.
🚀 Stay ahead of cybercriminals – Schedule your demo
#CyberSecurity #NetworkSecurity #MFA #WiFiSecurity #AUMINT