Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.
According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.
The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.
The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.
According to DZNet: Β Mimecast says hackers abused one of its certificates to access Microsoft accounts.
Mimecast, a provider of email management software, said learned of the security incident from Microsoft.
Read more about Examples and Numbers of Social Engineering attacks Β βΊ
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
𧨠When Operational Technology Fails, It’s Not Just Downtime β It’s Disaster
π° Water plants. π₯ Hospitals. β‘ Grids.
π₯ One successful Operational Technology breach = cascading chaos.
π§ Boards must treat Operational Technology the way they treat financial or legal risk: with oversight, testing, and response planning.
π‘οΈ AUMINT.io brings that discipline to Operational Technology β with board-grade briefings, red team exercises, and risk roadmaps.
π Get your custom Operational Technology strategy session: https://calendly.com/aumint/aumint-intro
π¬ What critical system do you think is most at risk? π
π #CriticalInfrastructure #Operational TechnologySecurity #BoardOversight #AUMINT
Google Forms: The New Frontier for Phishing Attacks
π¨ Google Forms: The New Tool for Phishing Attacks
π§ Cybercriminals are now leveraging Google Forms to create deceptive phishing campaigns that bypass traditional email security filters.
π These malicious forms, hosted on Google’s own domain, mimic legitimate login pages, tricking users into revealing sensitive credentials.
π‘οΈ AUMINT.io’s Trident platform addresses this threat by:
Simulating real-world phishing attacks to train employees.
Providing CISOs with insights into human risk factors.
Enhancing organizational resilience against social engineering tactics.
π Empower your team to recognize and thwart these sophisticated attacks.
π Schedule your free strategy session with AUMINT.io today and strengthen your organization’s human firewall.β
#CyberSecurity #Phishing #GoogleForms #EmployeeTraining #AUMINT #CISO
π¦ Compliance β Preparedness
β You passed an audit.
π₯ But what happens when a real attack hits your Operational Technology layer?
π§ͺ Simulation reveals what a checklist never will: how people, systems, and decisions perform under pressure.
π And in most cases? Itβs a wake-up call.
π‘οΈ AUMINT.io delivers high-impact Operational Technology breach simulations designed for board-level insights.
π Want to try one? Book here: https://calendly.com/aumint/aumint-intro
π¬ Whatβs a myth your board believes about cyber readiness? π
π #CyberPreparedness #BoardSecurity #OTSimulation #AUMINT