United States Reported Less Data Breaches in 2020 but with much more Expensive Successful Hacker Attacks
According to the annual report of the Identity Theft Resource Center (ITRC), 1,108 cyber incidents were reported in 2020 and the number casualties from these incidents was close to 301 million people, a drop of 66% over the previous year.
The social engineering technique of impersonation also helped attackers reap massive profits:
The volume of business fraud and hacking by corporate e-mail systems (BECs) reported to the FBI in 2020 was US$ 1.8 Billion – a figure that reflects half of all cyber damage in monetary terms.
“The trend away from mass data breaches and toward more precise and sophisticated cyberattacks doesn’t mean businesses can relax. Just the opposite. They need to learn whole new ways of protecting their data.”
– James E. Lee, ITRC COO
Read more about Examples and Numbers of Social Engineering Hacker Attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
🛡️ CISOs: Top 7 Open-Source Threat Intelligence Platforms to Explore 🛡️
Threat intelligence is key to staying ahead of attackers — but commercial platforms can be costly. Open-source solutions offer powerful alternatives for gathering, analyzing, and sharing intel without breaking the bank.
Here are the top 7 open-source threat intelligence platforms CISOs should consider:
1️⃣ MISP (Malware Information Sharing Platform) – Widely used for collaborative threat sharing and analysis.
https://www.misp-project.org/
2️⃣ OpenCTI – Modern platform designed to centralize, analyze, and visualize threat intelligence.
https://www.opencti.io/
3️⃣ Yeti – Enables collection, storage, and sharing of cyber threat indicators.
https://yeti-platform.github.io/
4️⃣ Cortex – Analysis engine that integrates with MISP for automated investigations.
https://www.theforeman.org/plugins/cortex/
5️⃣ CRITIFENCE – Threat intelligence and detection platform with open components.
https://critifence.com/
6️⃣ IntelMQ – Automated pipeline for collecting and processing threat data feeds.
https://www.intelmq.org/
7️⃣ ThreatFox – Community-driven platform focused on IoCs and threat actor tracking.
https://threatfox.abuse.ch/
Open-source platforms empower security teams to customize workflows, reduce vendor lock-in, and share vital intel in near real-time.
Want to complement your intel with human risk detection? AUMINT.io simulates social engineering attacks and delivers actionable insights to protect your greatest asset – your people.
📅 Schedule a free intro call here: Book now
💡 Save this post and elevate your threat intelligence game today!
#CISO #ThreatIntel #OpenSourceSecurity #CyberSecurity #AUMINT
1.2 Million Healthcare Devices Exposed Online – The Alarming Security Gap Putting Lives at Risk
🏥 1.2 Million Healthcare Devices Exposed – Patient Lives at Stake
⚠️ Over 1.2 million connected medical devices are currently exposed online, from MRI machines to infusion pumps.
🛑 These aren’t just data risks – attackers could disrupt treatment, alter diagnostic results, or even take control of life-saving systems.
📉 Many of these devices run outdated software, often with no patches available, making them easy entry points for cybercriminals.
🌐 Once inside, attackers can move laterally, targeting entire hospital networks in minutes.
🔍 The biggest gap? Lack of visibility. Many healthcare organizations don’t even know how many devices are connected – or how vulnerable they are.
💡 Relying on periodic audits is no longer enough. Real-time monitoring, segmentation, and proactive defense are now mission-critical.
📢 Don’t wait for an incident to expose your risks – book your AUMINT.io consultation today and take control of your healthcare cybersecurity posture.
#CyberSecurity #HealthcareSecurity #OTSecurity #CISOs #PatientSafety #DataProtection #RiskManagement
🚨 CISOs: Best Free Incident Response Playbooks to Download Today 🚨
In a breach, every second counts. A well-prepared incident response (IR) playbook turns chaos into coordinated action – saving time, money, and reputation.
Struggling to build or refine your IR plan? These free, expertly crafted playbooks will give you a strong foundation for fast, effective response:
1️⃣ SANS Incident Handler’s Handbook – Classic, practical guidance used globally by responders.
https://www.sans.org/reading-room/whitepapers/incident/incident-handlers-handbook-33901
2️⃣ NIST Computer Security Incident Handling Guide (SP 800-61r2) – Comprehensive framework trusted across industries.
https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final
3️⃣ CERT Resilience Management Model (CERT-RMM) – Focuses on resilience through repeatable IR processes.
https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=508839
4️⃣ MITRE ATT&CK Playbooks – Attack-focused playbooks mapping response to attacker tactics.
https://attack.mitre.org/resources/playbooks/
5️⃣ CISA Incident Response Playbook – Government-grade recommendations for structured, rapid action.
https://www.cisa.gov/publication/cisa-incident-response-playbook
Download, customize, and train your teams on these playbooks to reduce downtime and contain damage faster.
Ready to enhance your IR with real-world human risk insights? AUMINT.io runs targeted social engineering attack simulations and provides actionable metrics CISOs trust.
📅 Book a free intro call today: Schedule here
💾 Save this post and keep these essential playbooks within reach.
#CISO #IncidentResponse #CyberSecurity #InfoSec #AUMINT