Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.

According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.

The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.

The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.

According to DZNet:  Mimecast says hackers abused one of its certificates to access Microsoft accounts.

Mimecast, a provider of email management software, said learned of the security incident from Microsoft.

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

🕵️‍♂️ Curious What Hackers Know About Your Company?

It’s more than you think:
• Old test environments still online
• Slack URLs exposing metadata
• Staff emails linked to breaches

This is the goldmine attackers quietly exploit.

AUMINT’s Attack Surface Report (€1,500) uncovers all this and ranks it by real business risk.

It’s not just about detection – it’s about prevention through visibility.

👉 See what attackers already know: https://calendly.com/aumint/aumint-intro

#CyberIntel #RedTeam #SecurityOps #AttackSurface #AUMINT

read more

Help Desk Impersonation Is the New Favorite Move in Social Engineering

📞 Fake IT Help Desks Are Targeting Your Team Now

🚨 Cybercriminals are impersonating internal support teams – and it’s catching companies off guard.

🧠 The voice sounds legit. The details are right. The urgency feels real. But that “IT agent” is actually harvesting your login info.

🎯 These impersonators spoof internal caller IDs and even mimic your own help desk templates to manipulate trust.

🕵️ Employees assume anything from the help desk is safe – which is exactly why it works.

🛑 Most security training completely overlooks internal impersonation risks.

📌 AUMINT.io fixes that.

We simulate real help desk impersonation attacks across phone and email to build real-life reflexes in your team.

✅ Give your staff the instincts to say “no” even when it sounds like help.

Book Your Simulation

#SocialEngineering #CyberSecurity #HelpDeskScams #SecurityAwareness #CISO #SMBSecurity #AUMINT #ImpersonationFraud #ITLeadership #PhishingDefense

read more

💥 Hackers Don’t Need to Break In – They Just Log In

That one employee using the same password on a hacked forum?
Or that unsecured legacy asset still indexed on public search engines?

It only takes one exposed credential or forgotten port to trigger a breach.

And guess what? These exposures don’t show up in your internal dashboards.

✅ Our €1,500 Attack Surface Report reveals the full picture – from leaked creds to rogue assets.

Book your scan. Close your risk. https://calendly.com/aumint/aumint-intro

#CredentialLeak #CyberHygiene #AttackSurface #CISO #InfoSecLeaders #AUMINT

read more