Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.

According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.

The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.

The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.

According to DZNet:  Mimecast says hackers abused one of its certificates to access Microsoft accounts.

Mimecast, a provider of email management software, said learned of the security incident from Microsoft.

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

⭐ Free Reputation Monitoring Tools CISOs Rarely Share ⭐

Corporate reputation is a critical but often overlooked attack surface. Threat actors exploit it through phishing, impersonation, and misinformation campaigns. The good news? There are free tools that give CISOs visibility into reputation risks.

Here are the top free reputation monitoring tools:

1️⃣ Google Alerts – Track brand mentions, URLs, and suspicious activity in real time.
🔗 https://www.google.com/alerts

2️⃣ BrandMentions Free Plan – Monitor social and web mentions of your company and executives.
🔗 https://brandmentions.com/

3️⃣ Talkwalker Alerts – Receive notifications about brand mentions, industry threats, or fake accounts.
🔗 https://www.talkwalker.com/alerts

4️⃣ Mention (Free Tier) – Detect unauthorized brand use, impersonation, or negative coverage.
🔗 https://mention.com/en/

5️⃣ Awario Free Plan – Monitors social and web mentions for reputation risk signals.
🔗 https://awario.com/

6️⃣ Hootsuite Free Plan – Track social accounts and emerging reputation threats.
🔗 https://hootsuite.com/

7️⃣ TweetDeck – Monitor Twitter mentions, hashtags, and suspicious user activity.
🔗 https://tweetdeck.twitter.com/

⚡ Takeaway: These free tools let CISOs detect reputation attacks early, protect executives, and mitigate brand exposure before it escalates.

At AUMINT.io, we enhance this protection by simulating social engineering attacks targeting employees and executives to see where reputation risk originates from human behavior.

🔗 Curious how your team would handle reputation-focused attacks? Book a free demo

#ReputationManagement #CISO #CyberSecurity #ThreatMonitoring #AUMINT

read more

The Identity Protection Maturity Myth That Leaves Enterprises Exposed

🔐 Identity Protection Maturity Is a Dangerous Illusion

⚠️ Many enterprises think they’re secure because they’ve deployed MFA, SSO, and identity tools – yet attackers still slip through.

😱 The shocking truth is that cybercriminals rarely need to hack the technology. They exploit the human layer by convincing employees to “approve” fraudulent requests or reset access controls.

📊 This maturity myth creates a false sense of safety. Dashboards look green, executives feel reassured, but real-world breaches prove otherwise.

💡 Identity protection is not about checkboxes – it’s about resilience against manipulation. The missing piece is continuous, real-world simulations that train employees to recognize and resist these tactics.

🚨 Without this, one compromised account can give attackers the keys to the kingdom.

👉 AUMINT.io’s Trident platform equips teams with tailored, evolving simulations that turn the human factor into your strongest defense.

📅 Book your intro session here
and learn how to close the human gap in your security strategy.

#CISO #CEO #CFO #CyberSecurity #FraudPrevention #IdentitySecurity #AwarenessTraining

read more

91 Million Lost to a Social Engineering Bitcoin Scam – How to Protect Your Assets

🚨 $91 Million Lost to Social Engineering in Crypto

⚠️ A high-profile investor fell victim to a meticulously executed Bitcoin scam, losing $91 million overnight.

💡 Fraudsters exploit trust and human error, bypassing even the most advanced technical safeguards.

🔍 Social engineering targets communication gaps, psychological triggers, and unsuspecting staff, making human vigilance the critical defense.

🛡️ AUMINT Trident simulates real-world attacks, training teams to detect deception, verify communications, and react under pressure, reinforcing human security layers.

📅 Protect your digital assets and organization before it’s too late: https://calendly.com/aumint/aumint-intro
.

#CryptoSecurity #CISO #SocialEngineering #FraudPrevention #InvestorProtection #BlockchainSecurity #ExecutiveProtection

read more