Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.
According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.
The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.
The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.
According to DZNet: Mimecast says hackers abused one of its certificates to access Microsoft accounts.
Mimecast, a provider of email management software, said learned of the security incident from Microsoft.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Weaponized Trust – How Hackers Are Turning Certificates Against You
🔐 Hackers Are Signing Malware With Trusted Certificates
⚠️ They’re no longer brute-forcing their way in – they’re using stolen private keys and signing certificates to slip past your defenses.
📦 Signed malware now looks safe to: – Antivirus – EDR systems – Users
💥 This isn’t just technical – it’s psychological. Users are trained to trust “Verified” files. And that’s exactly what attackers exploit.
🧠 AUMINT.io’s Trident platform breaks the false trust cycle: – Simulates realistic attack behaviors – Conditions users to question what looks legit – Provides CISOs with real-time risk insights
🎯 When malware hides behind a trusted certificate, your last line of defense is human instinct. Train it with Trident.
💬 Book your intro call – before trust gets weaponized against you.
#CyberResilience #StolenCerts #HumanFirewall #CISO #SecurityAwarenessTraining #TridentByAUMINT #SocialEngineeringDefense #SignedMalware
The Cybersecurity Wake-Up Call No One Wants to Hear
🚨 Human Error Still Tops Cyber Risk Charts – Here’s Why
📉 Lack of security awareness remains the #1 threat to organizations
👀 It’s not outdated firewalls – it’s untrained teams
💥 Social engineering is evolving faster than your current training programs
🧠 Annual workshops don’t stand a chance against daily AI-fueled phishing and impersonation attacks
🔄 That’s where AUMINT.io’s Trident flips the script:
🎯 Adaptive, ongoing training simulations tailored to real-world social engineering threats
📊 Live dashboards for CISOs to track awareness risk in real time
✅ Engaging, relevant, and behavior-focused – not boring checkboxes
🛡️ Your tech stack is only as strong as your human layer.
💬 Book your security awareness strategy session now
#HumanRisk #SecurityAwareness #TridentByAUMINT #CISO #CyberResilience #SocialEngineering #PhishingDefense
Marks & Spencer Cyberattack: A Wake-Up Call for Retail Cybersecurity
🛍️ Marks & Spencer Cyberattack: A Wake-Up Call for Retailers
🔐 The recent cyber incident at M&S disrupted online orders and in-store services, highlighting vulnerabilities in retail cybersecurity.
💳 Customers faced issues with contactless payments and gift card transactions, emphasizing the need for robust digital defenses.
📉 The financial impact is significant, with potential losses from suspended online sales and diminished customer trust.
🛡️ Retailers must prioritize comprehensive cybersecurity strategies that include technological safeguards and employee training.
💡 AUMINT.io’s Trident platform offers:
Advanced threat detection to identify and mitigate risks.
Continuous employee training to recognize and respond to threats.
Incident response planning to ensure business continuity.
📈 Strengthen your organization’s cybersecurity posture.
👉 Schedule your free strategy session with AUMINT.io now and protect your business from cyber threats.
#CyberSecurity #RetailSecurity #M&S #AUMINT #CISO