Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.

According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.

The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.

The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.

According to DZNet:  Mimecast says hackers abused one of its certificates to access Microsoft accounts.

Mimecast, a provider of email management software, said learned of the security incident from Microsoft.

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

How One Passenger Lost $17,000 to a United Airlines Scam – And What It Teaches Every Business About Fraud Prevention

✈️ $17,000 Gone Overnight – The United Airlines Scam Every Leader Must Understand

😱 A United Airlines passenger thought they were fixing a booking issue – instead, they lost $17,000 in hours.

🔎 Cybercriminals cloned support channels so well that the victim never realized they weren’t speaking with the real airline.

💡 Here’s the shocking part: the same tactic is already being used against employees, vendors, and executives. If one individual can be tricked so easily, imagine the risks inside an organization handling millions in transactions daily.

🚨 Attackers aren’t just sending clumsy phishing emails anymore. They use urgency, authority, and brand familiarity to manipulate human decisions. This isn’t a “tech” problem – it’s a human factor problem.

📊 For mid-market firms, one fraudulent transfer can create devastating financial and reputational damage. Prevention is no longer optional.

🔐 That’s where recurring simulation-driven training becomes critical. Employees need to recognize and resist these manipulations before real losses occur.

👉 AUMINT.io’s Trident platform equips businesses with ongoing, real-world attack simulations tailored to evolving threats.

💬 Are your teams ready for this type of attack? Or would they trust the fake “support line” too?

📅 Book your intro session here
and learn how to protect your organization before the next scam hits.

#CISO #CEO #CFO #FraudPrevention #CyberSecurity #AwarenessTraining #RiskManagement

read more

Hackers Are Exploiting Help Desks to Breach Government Cyber Defenses

🚨 Help Desks Are the Hidden Cybersecurity Vulnerability

💡 Hackers are targeting government help desks to bypass even the strongest technical defenses.

⚠️ Social engineering exploits trust and urgency, turning routine support interactions into entry points for attackers.

🔍 One compromised help desk session can open doors to sensitive networks and critical data.

📊 Attackers are analyzing workflows and organizational structures to craft highly convincing schemes that evade standard IT protections.

🔥 Proactive simulations and continuous training are key to transforming help desk personnel into a robust human firewall.

👥 AUMINT Trident provides recurring, realistic social engineering simulations that reveal vulnerabilities and deliver actionable insights.

📅 Secure your agency’s frontline now – book a session: https://calendly.com/aumint/aumint-intro
.

#CISO #GovernmentSecurity #CyberSecurity #SocialEngineering #FraudPrevention #HumanFactor #RiskManagement

read more

Executives and Celebrities Are Prime Targets for Social Engineering Attacks

🚨 Executives and Celebrities Under Targeted Attacks

💡 Hackers are exploiting public data and social media to craft highly convincing schemes.

⚠️ Personalized social engineering attacks manipulate psychology – urgency, flattery, or fear – to bypass standard security.

📊 Even top-tier executives with robust IT defenses are vulnerable because human behavior remains the weak link.

🔍 Every interaction, post, or appearance can be mined to create targeted attacks that compromise individuals and organizations alike.

🔥 Mitigation requires proactive social engineering simulations and continuous employee training.

👥 AUMINT Trident simulates real-world attacks, tracks responses, and strengthens your human firewall before breaches happen.

📅 Protect your leadership and teams now – book a session: https://calendly.com/aumint/aumint-intro
.

#CISO #ExecutiveProtection #CyberSecurity #SocialEngineering #FraudPrevention #HumanFactor #RiskManagement #LeadershipSecurity

read more