Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.
According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.
The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.
The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.
According to DZNet: Mimecast says hackers abused one of its certificates to access Microsoft accounts.
Mimecast, a provider of email management software, said learned of the security incident from Microsoft.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Why cybersecurity teams need oversight of social media accounts 
These days, if your business doesn’t have a presence on social media - whether that’s Twitter, Facebook or LinkedIn - you’re missing a trick. It’s becoming a vital way to connect with customers. However, it also creates a vulnerability that you might not be...
“Europol ploy”: the latest phone scam in Europe
A new phone scam is on the rise in Germany and other parts of Europe in which scammers impersonate Europol officers to trick victims into transferring them money, vouchers or personal details. How does the scam work? First, you will receive a call with a recorded...
How AI can help turn the tables on scammers 
As cybercriminals become increasingly sophisticated with their scams, using artificial intelligence (AI) to scale up their operations, it can feel like fighting a losing battle. However, AI and machine learning (ML) can also be used against them. Here’s how: Detecting...