Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.

According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.

The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.

The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.

According to DZNet:  Mimecast says hackers abused one of its certificates to access Microsoft accounts.

Mimecast, a provider of email management software, said learned of the security incident from Microsoft.

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

🧠 You Can’t Protect What You Don’t See

Most orgs only monitor what they own.
But attackers look at everything – the exposed, abandoned, and overlooked.

Think:
• Orphaned SaaS apps
• Staff emails leaked on dark web
• Unclaimed DNS records

This isn’t hidden in the dark web. It’s often public – just not on your radar.

💡 AUMINT’s €1,500 Attack Surface Report maps your full digital exposure – before someone else does.

Secure your blind spots: https://calendly.com/aumint/aumint-intro

#CyberSecurity #AttackSurface #ITRisk #InfoSecEurope #DigitalExposure #CISO

read more

Vendor Email Compromise Is the Silent Killer of Trust

📩 The Next Cyberattack Will Come From a Trusted Email

💥 Vendor Email Compromise (VEC) is rising fast – and it’s more dangerous than BEC.

🕵️‍♂️ Attackers hijack legitimate vendor email accounts and slip into ongoing conversations. The invoice looks normal. The sender’s domain is clean. But the bank details? Totally fake.

💰 One click – and six figures vanish without a trace.

🤝 These aren’t random attacks. They’re hyper-targeted, patient, and timed to your billing cycle.

🧩 Most security teams don’t catch them because the email really does come from your vendor.

💡 The only solution? Human-level awareness, real-world simulations, and executive visibility into behavioral weak spots.

📉 Trust without verification is now a threat vector.

At AUMINT.io, we help finance, procurement, and executive teams simulate and counter VEC threats before attackers strike.

Your next invoice request might be a trap – would your team catch it?

Book Your Vendor Risk Simulation Today

#CyberSecurity #VendorEmailCompromise #VEC #InvoiceFraud #CISO #ProcurementSecurity #FinanceRisk #SocialEngineering #AUMINT #FraudPrevention #SMBSecurity

read more

🔎 What If Your Biggest Risk Isn’t Even Inside Your Network?

Modern attacks start outside your perimeter – on public infrastructure, unsecured APIs, even social media.

Things like:
• Leaked employee credentials
• Misconfigured subdomains
• Untracked SaaS access

All of this lives outside your SIEM’s reach. But attackers find it fast.

Our €1,500 Attack Surface Report is a practical way to find and fix what they will exploit.

Not theory. Not fluff. Just real exposures mapped to business risk.

✅ Schedule your session here: https://calendly.com/aumint/aumint-intro

#CyberThreats #DigitalExposure #SOC #CISO #HumanRisk #AttackSurface #AUMINT

read more