Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.
According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.
The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.
The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.
According to DZNet: Mimecast says hackers abused one of its certificates to access Microsoft accounts.
Mimecast, a provider of email management software, said learned of the security incident from Microsoft.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
🧩 OT Security Without Segmentation? That’s a Door Left Wide Open.
🚪 Hackers broke into Lviv’s heating utility via exposed IT – then walked right into OT.
🌡️ 600 buildings lost heat for 2 days. No segmentation. No detection.
🔍 That’s not bad luck – that’s bad governance.
💡 Boards must prioritize secure architecture – with OT/IT segmentation baked in.
🛡️ AUMINT.io delivers secure-by-design playbooks and simulations tailored for directors.
📆 Get your playbook: https://calendly.com/aumint/aumint-intro
💬 Ever seen an OT disaster coming from miles away? Tell us how 👇
🔎 #CyberArchitecture #BoardResilience #AUMINT
Why Microsoft’s New Secure Future Initiative Won’t Be Enough Without You
🛡️ Microsoft’s Secure Future Won’t Secure Your People
📢 Microsoft’s new “Secure Future Initiative” is a powerful pivot – stronger engineering, more AI-driven threat detection, tighter controls. But…
🚨 None of it stops a user from clicking the wrong link.
🧠 Social engineering still bypasses the smartest tech. Why? Because humans trust, skip, forget, and fall for what feels safe.
🔐 AUMINT.io’s Trident platform fills the human gap: – Simulates ultra-targeted phishing + impersonation – Rewires reflexes through adaptive training – Shows CISOs where the next breach might start
📊 90% of breaches still involve human behavior. Microsoft can’t fix that. You can.
💬 Book your intro now – before a smart user becomes your weakest link.
#SecureFuture #CISO #HumanFirewall #SecurityAwarenessTraining #SocialEngineering #MicrosoftSecurity #TridentByAUMINT
Weaponized Trust – How Hackers Are Turning Certificates Against You
🔐 Hackers Are Signing Malware With Trusted Certificates
⚠️ They’re no longer brute-forcing their way in – they’re using stolen private keys and signing certificates to slip past your defenses.
📦 Signed malware now looks safe to: – Antivirus – EDR systems – Users
💥 This isn’t just technical – it’s psychological. Users are trained to trust “Verified” files. And that’s exactly what attackers exploit.
🧠 AUMINT.io’s Trident platform breaks the false trust cycle: – Simulates realistic attack behaviors – Conditions users to question what looks legit – Provides CISOs with real-time risk insights
🎯 When malware hides behind a trusted certificate, your last line of defense is human instinct. Train it with Trident.
💬 Book your intro call – before trust gets weaponized against you.
#CyberResilience #StolenCerts #HumanFirewall #CISO #SecurityAwarenessTraining #TridentByAUMINT #SocialEngineeringDefense #SignedMalware