In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

Scallywag Exposes WordPress Ad Fraud – What You Must Know

🛑 WordPress Ad Fraud Alert: Scallywag at Work

🚨 Scallywag injects malicious scripts into WordPress ad slots that reroute clicks or run hidden cryptomining.

⚠️ Sites appear normal—users don’t notice—but revenue and performance suffer silently over time.

🧩 Ad networks often allow third-party JavaScript without strict validation, making plugins or dependencies risky.

🔐 Defend by restricting script origins, applying CSP, sandboxing iframes, and auditing JS payloads regularly.

✅ AUMINT.io simulates ad fraud attacks and builds alert systems to catch script anomalies.

📅 Don’t let fraud drain your site—Book your AUMINT.io session
and protect your ecosystem now.

#CISO #CTO #DevOps #WebSecurity #AdFraud #WordPress #AUMINT

read more

Blue Shield’s Health Data Leak – How a Misconfigured Analytics Tool Exposed Millions

🔔 Blue Shield Leak Shows Analytics Can Backfire

📉 A misconfigured Google Analytics setup exposed health details of 4.7 million members to Google Ads.

⚠️ Claims include medical claim dates, demographics, provider searches—not financial data or SSNs.

🧩 This wasn’t an attack—it was a misalignment between tool access and intent.

🛡️ Embedded analytics need contextual isolation and continuous auditing.

✅ AUMINT.io simulates web tracking threats and hardens hidden data pipelines.

📆 Don’t let analytics tools become liability – Book your session
and protect your organization now.

#CISO #CTO #CIO #HealthTech #CyberSecurity #DataPrivacy #AnalyticsSecurity #AUMINT

read more

CIOs Question Security ROI – Why Investment Isn’t Enough

🚨 Security Spending Isn’t Delivering ROI

🔍 88% of organizations still saw cybersecurity incidents last year even amid high investment levels.

⚠️ Nearly half of CIOs believe they have overpaid for tools with features they never use.

💡 Just 58% feel confident identifying gaps in their security coverage.

🔐 AI-driven attacks and deepfakes now rank among the top threats alongside phishing and malware.

✅ AUMINT.io helps you streamline your security stack, stop overpaying, and ensure every tool you use contributes real protection.

📈 Don’t let complexity erode value – Schedule your AUMINT.io strategy session
now and transform your cybersecurity investment into measurable outcomes.

#CISO #CIO #CyberSecurity #InvestmentROI #RiskManagement #LogicalisReport #ThreatProtection #AUMINT

read more