Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.

According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.

The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.

The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.

According to DZNet:  Mimecast says hackers abused one of its certificates to access Microsoft accounts.

Mimecast, a provider of email management software, said learned of the security incident from Microsoft.

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

✅ CISOs: The Ultimate List of Free Compliance Checklists ✅

Staying compliant in cybersecurity is a moving target, and missing just one requirement can lead to costly breaches or fines. That’s why having access to practical, free compliance checklists tailored for CISOs is a game changer.

Here’s your ultimate list of top free compliance checklists to keep your security program audit-ready and risk-proof:

1️⃣ NIST Cybersecurity Framework (CSF) Checklist – Simplify your gap analysis with this official guide.
https://www.nist.gov/cyberframework

2️⃣ ISO/IEC 27001:2013 Compliance Checklist – Essential for establishing an effective Information Security Management System (ISMS).
https://advisera.com/27001academy/iso-27001-checklist/

3️⃣ GDPR Compliance Checklist – Ensure your organization meets EU data protection regulations effortlessly.
https://gdpr.eu/checklist/

4️⃣ HIPAA Security Rule Checklist – Critical for healthcare and related industries to protect sensitive health data.
https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/administrative/securityrule/hipaa-security-checklist.pdf

5️⃣ CMMC Level 1 Compliance Checklist – For defense contractors needing Cybersecurity Maturity Model Certification readiness.
https://www.acq.osd.mil/cmmc/docs/CMMC_ModelMain_V1.02_20200318.pdf

These checklists are designed to help you track, validate, and strengthen your security posture against evolving regulatory demands. Download and customize them for your unique risk environment.

Want to take compliance to the next level with ongoing social engineering risk assessments? 🚀 Book a free call with AUMINT.io to learn how our platform empowers CISOs to detect and mitigate human vulnerabilities: Schedule here

Save this post and build your compliance toolkit today! 📋

#CISO #Compliance #CyberSecurity #InfoSec #Regulations #AUMINT

read more

The 10 Brands Cybercriminals Love – And How to Stop Them

🛑 These 10 Brands Are Fueling the Latest Phishing Storm

📌 Microsoft. Google. Amazon. DHL. Apple.
They’re not being hacked – they’re being weaponized.

📨 Cybercriminals are using our most trusted brands as bait.

🧠 It works because our brains associate these names with legitimacy – not danger.

⚠️ Employees are clicking. They’re submitting credentials. They’re opening the door wide.

🔍 The top 10 most impersonated brands in phishing attacks today?
Microsoft
Google
Amazon
LinkedIn
Adobe
Apple
Facebook
DHL
Instagram
WhatsApp

💣 That’s not just a trend – it’s a strategy.
Attackers are now laser-focused on one thing: trust.

👁️ Most simulations today don’t test this. They don’t recreate the real-world pressure and brand mimicry your team is actually up against.

🎯 That’s where AUMINT.io comes in.
Our platform builds recurring simulations that mimic these exact phishing lures – testing real reactions, not checkbox knowledge.

🔒 Don’t wait until your team clicks.
Protect them before it happens.

💬 Read the full breakdown and book a live walkthrough:
https://calendly.com/aumint/aumint-intro

#Cybersecurity #PhishingPrevention #CISO #SecurityAwareness #EmployeeTraining #AUMINT #SecurityLeaders #FraudPrevention

read more

🚨 CISOs: Best Free Incident Response Playbooks to Download Today 🚨

When seconds count, having a solid Incident Response (IR) playbook can make all the difference. Yet, many security leaders struggle to find comprehensive, practical, and free resources tailored for today’s evolving threats.

Here’s a curated list of top-tier free IR playbooks every CISO should download now to boost your team’s readiness and resilience:

1️⃣ SANS Incident Handler’s Handbook – A detailed guide to managing security incidents effectively.
https://www.sans.org/reading-room/whitepapers/incident/incident-handlers-handbook-33901

2️⃣ NIST Computer Security Incident Handling Guide (SP 800-61r2) – A foundational standard for federal and private sectors alike.
https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final

3️⃣ CERT Resilience Management Model (CERT-RMM) – Focuses on managing operational resilience through IR processes.
https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=508839

4️⃣ MITRE ATT&CK Playbooks – Tailor your response tactics based on attacker behaviors and techniques.
https://attack.mitre.org/resources/playbooks/

5️⃣ CISA Incident Response Playbook – Practical steps from the US Cybersecurity and Infrastructure Security Agency.
https://www.cisa.gov/publication/cisa-incident-response-playbook

Each playbook offers unique value to fortify your defense strategy and streamline team coordination during incidents. Download, review, and customize these templates to fit your organization’s risk profile.

Ready to supercharge your incident response capabilities? 🚀 Book a free intro call with AUMINT.io to see how our social engineering simulation tool can enhance your security posture: Schedule here

Save this post and keep these essential resources at your fingertips! 🔐

#CISO #CyberSecurity #IncidentResponse #InfoSec #SecurityLeadership #AUMINT

read more