AUMINT.io Blog

 

Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources

HACKERS LOVE A BARGAIN

Why Hackers love bargin events and how to be protected?   Hackers love a bargain just as much as consumers do and the run up to Amazon Prime Day is a perfect opportunity to swindle. The hackers often use Scam Websites and Phishing campaigns to take advantage of...

What is Whaling and how to avoid it?

* This article is part of a sequel on Social Engineering Attack Types and how to avoid them. You can read our previous article about spear phishing, here:  (https://web.aumint.io/spearphishing-spear-phishing/). Whaling is a sophisticated and specifically targeted...

Spear Phishing

Perhaps you remember hearing about people getting requests from a Nigerian prince, a scam known as Phishing? Hackers spread wide nets, playing the numbers and hoping to take advantage of people's naivete and generosity. Today's hackers are far more sophisticated and...

IDN Homograph Attack aka UTF8 URL Impersonation

What is a IDN Homograph Attack? IDN (Internationalized Domain Name) Homograph Attack is a manipulative and simple, but sophisticated type of cyber attack. It is also called a "UTF8 URL Impersonation".   How does it work? A hacker poses as a trusted counterpart...

Warshipping attack – free books for all

What is Warshipping ?Warshipping uses disposable, low-cost, low-power computers to remotely perform close-proximity attacks, regardless of the hacker’s location. The attacker can control the device from the comfort of their home anywhere in the world. The only thing...

Recent Bite-Size Posts

HACKERS LOVE A BARGAIN

Why Hackers love bargin events and how to be protected?   Hackers love a bargain just as much as consumers do and the run up to Amazon Prime Day is a perfect opportunity to swindle. The hackers often use Scam Websites and Phishing campaigns to take advantage of...

What is Whaling and how to avoid it?

* This article is part of a sequel on Social Engineering Attack Types and how to avoid them. You can read our previous article about spear phishing, here:  (https://web.aumint.io/spearphishing-spear-phishing/). Whaling is a sophisticated and specifically targeted...

Spear Phishing

Perhaps you remember hearing about people getting requests from a Nigerian prince, a scam known as Phishing? Hackers spread wide nets, playing the numbers and hoping to take advantage of people's naivete and generosity. Today's hackers are far more sophisticated and...

Warshipping attack – free books for all

What is Warshipping ?Warshipping uses disposable, low-cost, low-power computers to remotely perform close-proximity attacks, regardless of the hacker’s location. The attacker can control the device from the comfort of their home anywhere in the world. The only thing...

US 2020 Less Data Breaches but More Expensive

United States Reported Less Data Breaches in 2020 but with much more Expensive Successful Hacker Attacks   According to the annual report of the Identity Theft Resource Center (ITRC), 1,108 cyber incidents were reported in 2020 and the number casualties from...

Nefilim Hackers used deceased employee email

In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system. Nefilim Ransomware Attack...

What is Exposure Report

The Report is Representing Organization's Social Engineering Exposure Level It is unique for each Organization. As it is provided after analyzing organization's operation and its cyber awareness. The Cyber Exposure Score is the average of all the Asset Exposure Scores...

See how the Hacker sees you

Get your FREE Exposure Report NOW
Get the report