Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.
According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.
The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.
The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.
According to DZNet: Mimecast says hackers abused one of its certificates to access Microsoft accounts.
Mimecast, a provider of email management software, said learned of the security incident from Microsoft.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
1.2 Million Healthcare Devices Exposed Online – The Alarming Security Gap Putting Lives at Risk
🏥 1.2 Million Healthcare Devices Exposed – Patient Lives at Stake
⚠️ Over 1.2 million connected medical devices are currently exposed online, from MRI machines to infusion pumps.
🛑 These aren’t just data risks – attackers could disrupt treatment, alter diagnostic results, or even take control of life-saving systems.
📉 Many of these devices run outdated software, often with no patches available, making them easy entry points for cybercriminals.
🌐 Once inside, attackers can move laterally, targeting entire hospital networks in minutes.
🔍 The biggest gap? Lack of visibility. Many healthcare organizations don’t even know how many devices are connected – or how vulnerable they are.
💡 Relying on periodic audits is no longer enough. Real-time monitoring, segmentation, and proactive defense are now mission-critical.
📢 Don’t wait for an incident to expose your risks – book your AUMINT.io consultation today and take control of your healthcare cybersecurity posture.
#CyberSecurity #HealthcareSecurity #OTSecurity #CISOs #PatientSafety #DataProtection #RiskManagement
🚨 CISOs: Best Free Incident Response Playbooks to Download Today 🚨
In a breach, every second counts. A well-prepared incident response (IR) playbook turns chaos into coordinated action – saving time, money, and reputation.
Struggling to build or refine your IR plan? These free, expertly crafted playbooks will give you a strong foundation for fast, effective response:
1️⃣ SANS Incident Handler’s Handbook – Classic, practical guidance used globally by responders.
https://www.sans.org/reading-room/whitepapers/incident/incident-handlers-handbook-33901
2️⃣ NIST Computer Security Incident Handling Guide (SP 800-61r2) – Comprehensive framework trusted across industries.
https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final
3️⃣ CERT Resilience Management Model (CERT-RMM) – Focuses on resilience through repeatable IR processes.
https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=508839
4️⃣ MITRE ATT&CK Playbooks – Attack-focused playbooks mapping response to attacker tactics.
https://attack.mitre.org/resources/playbooks/
5️⃣ CISA Incident Response Playbook – Government-grade recommendations for structured, rapid action.
https://www.cisa.gov/publication/cisa-incident-response-playbook
Download, customize, and train your teams on these playbooks to reduce downtime and contain damage faster.
Ready to enhance your IR with real-world human risk insights? AUMINT.io runs targeted social engineering attack simulations and provides actionable metrics CISOs trust.
📅 Book a free intro call today: Schedule here
💾 Save this post and keep these essential playbooks within reach.
#CISO #IncidentResponse #CyberSecurity #InfoSec #AUMINT
The 127 Percent Spike in Malware Complexity – Why Legacy Defenses Are Now a Liability
🛡️ Malware Complexity Up 127 Percent – Are You Prepared?
🚨 Attackers aren’t just increasing volume – they’re evolving sophistication at record speed.
💥 A 127 percent spike in malware complexity means threats now use AI-driven evasion, polymorphic code, and stealth tactics that make legacy defenses nearly useless.
🏭 Industrial and OT environments are prime targets, with disruptions that can shut down plants or halt critical services.
🕵️ Criminals exploit outdated systems as entry points, blending into trusted channels to bypass detection entirely.
📊 Defending against this wave requires a shift from outdated detection to prevention-first strategies with behavioral analytics, real-time visibility, and advanced threat intelligence.
📢 Legacy tools aren’t just ineffective – they’re dangerous. Book your AUMINT.io consultation today and fortify your organization before the next strike.
#CyberSecurity #Malware #ThreatIntelligence #OTSecurity #CISOs #RiskManagement #ITSecurity #DataProtection