Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.

According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.

The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.

The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.

According to DZNet:  Mimecast says hackers abused one of its certificates to access Microsoft accounts.

Mimecast, a provider of email management software, said learned of the security incident from Microsoft.

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

🌍 Operational Technology Attacks Aren’t Local – They’re Global Signals

🌐 When Ukraine loses heat, China lurks in U.S. power grids, and EU regulators tighten laws, it’s not coincidence.

🧠 It’s a wake-up call for boards to globalize their security thinking.

📊 Risk isn’t just enterprise-level. It’s geopolitical.

🛡️ AUMINT.io helps leadership teams model risk from Operational Technology to nation-level impact.

📆 Book your global risk review: https://calendly.com/aumint/aumint-intro

💬 What international Operational Technology threats are you watching? 👇

🔎 #GlobalCyberRisk #BoardLeadership #Operational TechnologyThreats #AUMINT

read more

DORA Is Here – And Fintechs Can’t Afford to Sleep on It

⚠️ DORA Is Live – And Fintechs Can’t Afford to Ignore It

💣 The Digital Operational Resilience Act (DORA) now mandates financial firms to prove cyber resilience
🔐 But most fintechs still overlook their #1 vulnerability – people
📩 Phishing, smishing, social engineering – these are the real gaps attackers exploit
📉 DORA doesn’t just demand tech defenses. It demands human awareness

🚫 Training once a year won’t cut it
📊 AUMINT.io’s Trident platform personalizes simulations to real roles, threat types, and evolving tactics
📈 And gives leaders real-time dashboards to track readiness and satisfy regulators

💥 Don’t let one click break your compliance, your continuity, or your customer trust

👉 Book your DORA strategy call now – resilience starts with your people

#FintechSecurity #DORACompliance #HumanRisk #CyberResilience #OperationalResilience #TridentByAUMINT #RegTech #Infosec #FintechCISOs

read more

🧩 Operational Technology Security Without Segmentation? That’s a Door Left Wide Open.

🚪 Hackers broke into Lviv’s heating utility via exposed IT – then walked right into Operational Technology.

🌡️ 600 buildings lost heat for 2 days. No segmentation. No detection.

🔍 That’s not bad luck – that’s bad governance.

💡 Boards must prioritize secure architecture – with Operational Technology/IT segmentation baked in.

🛡️ AUMINT.io delivers secure-by-design playbooks and simulations tailored for directors.

📆 Get your playbook: https://calendly.com/aumint/aumint-intro

💬 Ever seen an Operational Technology disaster coming from miles away? Tell us how 👇

🔎 #CyberArchitecture #BoardResilience #AUMINT

read more