Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.

According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.

The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.

The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.

According to DZNet:  Mimecast says hackers abused one of its certificates to access Microsoft accounts.

Mimecast, a provider of email management software, said learned of the security incident from Microsoft.

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

💥 Hackers Don’t Need to Break In – They Just Log In

That one employee using the same password on a hacked forum?
Or that unsecured legacy asset still indexed on public search engines?

It only takes one exposed credential or forgotten port to trigger a breach.

And guess what? These exposures don’t show up in your internal dashboards.

✅ Our €1,500 Attack Surface Report reveals the full picture – from leaked creds to rogue assets.

Book your scan. Close your risk. https://calendly.com/aumint/aumint-intro

#CredentialLeak #CyberHygiene #AttackSurface #CISO #InfoSecLeaders #AUMINT

read more

When Hackers Pose as Job Seekers – Your HR Inbox Becomes a Breach Point

📎 Your HR Team Might Be Downloading Hackers Right Now

🚨 Cybercriminals are now posing as job applicants – and it’s working.

💼 Fake resumes embedded with malware are being sent to recruiters every day. They look real. They match the job posting. But a single click installs a backdoor into your corporate network.

🎯 This tactic targets the one team that must open attachments from strangers: HR.

🧠 Groups like FIN6 are launching full campaigns this way – impersonating job seekers, injecting code into .docx files, and silently gaining access before anyone notices.

📉 Most security teams don’t train HR to defend against threats disguised as applications.

📌 That’s where AUMINT.io steps in.

We simulate applicant-based threats, coach HR on red flags, and build muscle memory against one of the fastest-growing attack vectors today.

Book Your HR Cyber Threat Simulation Now

#CyberSecurity #SocialEngineering #HRtech #RecruiterSecurity #HiringRisks #InfoSec #TalentAcquisition #AUMINT #FIN6 #MalwareAwareness #SMBSecurity

read more

🧠 You Can’t Protect What You Don’t See

Most orgs only monitor what they own.
But attackers look at everything – the exposed, abandoned, and overlooked.

Think:
• Orphaned SaaS apps
• Staff emails leaked on dark web
• Unclaimed DNS records

This isn’t hidden in the dark web. It’s often public – just not on your radar.

💡 AUMINT’s €1,500 Attack Surface Report maps your full digital exposure – before someone else does.

Secure your blind spots: https://calendly.com/aumint/aumint-intro

#CyberSecurity #AttackSurface #ITRisk #InfoSecEurope #DigitalExposure #CISO

read more