Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.

According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.

The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.

The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.

According to DZNet: Β Mimecast says hackers abused one of its certificates to access Microsoft accounts.

Mimecast, a provider of email management software, said learned of the security incident from Microsoft.

Read more about Examples and Numbers of Social Engineering attacks Β β€Ί

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

AI Can Now Create Deepfake CEOs – Is Your Team Prepared to Spot the Lie?

🎭 Deepfake CEOs Are Fooling Real Employees – Are Yours Next?

🧠 AI-generated audio and video are now good enough to impersonate your execs
🎯 One video or call from a fake β€œCEO” could cost millions in minutes
πŸ” Most teams aren’t trained to detect AI deception – Trident fixes that
⚠️ The human layer is your weakest link – or your strongest defense
πŸ“… Train your team before it’s too late

#DeepfakeFraud #ExecutiveImpersonation #AIThreats #HumanLayerSecurity #AUMINT #CyberAwareness

read more

πŸ” Security Theater Won’t Save You – Real Operational Technology Visibility Will

πŸ“‹ Most boards rely on ISO certs and audit checkboxes to feel β€œsecure.”

πŸ’₯ Reality check: attackers don’t care about your certifications – they care about your weak segmentation.

πŸ“Š Operational Technology environments are being linked to IT & cloud with zero risk modeling. Result? Massive exposure.

πŸ’‘ True visibility + simulation = resilience.

πŸ›‘οΈ At AUMINT.io, we help boards see the blind spots – and test their real-world impact.

πŸ“† Book your boardroom-ready Operational Technology simulation: https://calendly.com/aumint/aumint-intro

πŸ’¬ What gives you false confidence in your cyber posture? Drop a truth bomb πŸ‘‡

πŸ”Ž #CyberResilience #BoardSecurity #Operational TechnologyRisk #CISOTalk #AUMINT

read more

Chinese-Backdoored Networks Went Undetected for Years – Here’s How to Avoid Being Next

πŸ•΅οΈβ€β™‚οΈ State Hackers Hid in US Networks for Years

πŸ” Chinese spies quietly embedded malware into orgs via security appliances
🧠 These were not smash-and-grab attacks – they were patient, persistent, and personal
🚨 No traditional security tool detected it – humans never even saw it coming
βš™οΈ AUMINT.io’s Trident trains teams to recognize real-world stealth threats
πŸ“… Let’s secure your human layer now – before they exploit it

#CyberEspionage #HumanLayerSecurity #AUMINT #NationStateThreats #SocialEngineeringDefense #CISO

read more