Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.
According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.
The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.
The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.
According to DZNet: Β Mimecast says hackers abused one of its certificates to access Microsoft accounts.
Mimecast, a provider of email management software, said learned of the security incident from Microsoft.
Read more about Examples and Numbers of Social Engineering attacks Β βΊ
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
π΅οΈββοΈ 5 Free Zero-Day Trackers Every CISO Needs Handy π΅οΈββοΈ
Zero-days remain one of the biggest blind spots for security teams. Staying ahead means knowing where to track active vulnerabilities before they hit mainstream feeds. Here are 5 free resources every CISO should keep in their toolkit:
1οΈβ£ CISA Known Exploited Vulnerabilities (KEV) Catalog β Actively exploited vulnerabilities updated continuously.
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
2οΈβ£ MITRE CVE Database β The definitive catalog of vulnerabilities, including emerging zero-days.
https://cve.mitre.org/
3οΈβ£ Google Project Zero β Research group uncovering and publishing zero-day findings.
https://googleprojectzero.blogspot.com/
4οΈβ£ ZDI (Zero Day Initiative) β Public advisories on discovered and responsibly disclosed zero-days.
https://www.zerodayinitiative.com/advisories/published/
5οΈβ£ Exploit Database (OffSec) β Community-driven database tracking zero-day exploits and proof-of-concepts.
https://www.exploit-db.com/
β‘ These trackers wonβt stop attacks alone, but they give CISOs the visibility to patch fast, prioritize risks, and brief leadership with confidence.
At AUMINT.io, we go a step further β simulating how attackers exploit the human factor with phishing, vishing, and deepfake social engineering before a zero-day even gets weaponized.
π Want to see how your employees would react under a zero-day-themed phishing test? Book a demo
#ZeroDay #CISO #CyberSecurity #VulnerabilityManagement #AUMINT
Humans Remain the Weakest Link β Why Social Engineering Dominates Cyber Threats in 2025
π¨ Humans Are Still the #1 Cybersecurity Risk
π Over 80% of organizations now rank social engineering as their greatest threat.
π‘ Hereβs the twist: it is not just about phishing emails anymore. Attackers are using deepfakes, urgent voice calls, and even video manipulation to outsmart people in ways firewalls cannot stop.
π± The shock is not in the tools they use β it is in how easily human behavior is exploited. One click, one reply, one rushed decision can unlock the doors no hacker could force open.
π The data tells us most training programs are outdated. Annual awareness sessions fail because attackers test every single day. The result β mid-market firms are losing millions while attackers refine their playbook.
π₯ What works instead? Recurring simulations that mirror real-world social engineering attacks, combined with dashboards that show CISOs and boards exactly where their human vulnerabilities are hiding.
π₯ In 2025, the true security perimeter is people β and it is under constant siege.
π
Want to see how to transform employees into a resilient defense system? Book your session here: https://calendly.com/aumint/aumint-intro
.
#CISO #CyberSecurity #FraudPrevention #BoardDirectors #RiskManagement #HumanFactor #AwarenessTraining #CyberResilience
πΊ 7 Free Threat Maps CISOs Should Bookmark Today πΊ
Seeing cyber attacks unfold in real time changes how you think about defense. Threat maps give CISOs a powerful visual overview of attack activity worldwide β helping teams stay alert, informed, and prepared. Best part? These tools are free.
Here are 7 threat maps worth bookmarking:
1οΈβ£ Kaspersky Cyberthreat Real-Time Map β Global visualization of malware and phishing.
https://cybermap.kaspersky.com/
2οΈβ£ FireEye (Trellix) Threat Map β Tracks malicious traffic across regions.
https://threatmap.trellix.com/
3οΈβ£ Check Point Threat Map β Attack origins and targets updated live.
https://threatmap.checkpoint.com/
4οΈβ£ Fortinet Threat Map β High-volume global attack telemetry.
https://threatmap.fortiguard.com/
5οΈβ£ DDoS Attack Map by NETSCOUT β Real-time global DDoS tracking.
https://www.netscout.com/ddos-attack-map
6οΈβ£ Bitdefender Threat Map β Malware, phishing, and spam attack data.
https://threatmap.bitdefender.com/
7οΈβ£ Threatbutt Map (satirical yet insightful) β A different take on visualizing attacks.
https://threatbutt.com/map/
π These maps wonβt replace intel platforms, but theyβre powerful for awareness, briefings, and stakeholder communication.
At AUMINT.io, we help CISOs go beyond watching attacks β by simulating how attackers target employees directly with phishing, vishing, and deepfake tactics.
π Curious how your org would look on a threat map of human factor attacks? Letβs build one together: Book a demo
#ThreatIntelligence #CISO #CyberSecurity #IncidentResponse #AUMINT