Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.

According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.

The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.

The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.

According to DZNet: Β Mimecast says hackers abused one of its certificates to access Microsoft accounts.

Mimecast, a provider of email management software, said learned of the security incident from Microsoft.

Read more about Examples and Numbers of Social Engineering attacks Β β€Ί

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

πŸ”Ž Top Dark Web Search Engines Every Security Team Needs πŸ”Ž

Dark web intel is a goldmine for spotting early social engineering threats.
⚑ Speed and accuracy in finding hidden data can make all the difference.

Here are must-have darknet search engines and directories to empower your investigations:

🌐 Ahmia.fi – http://juhanurmihxlp77nkq76byazcldy2hlmovfu2epvl5ankdibsot4csyd.onion/
πŸ” Kilos – Dark Market Search – http://mlyusr6htlxsyc7t2f4z53wdxh3win7q3qpxcrbam6jf3dmua7tnzuyd.onion
πŸ•΅οΈ Recon Dark Market Search – http://recon222tttn4ob7ujdhbn3s4gjre7netvzybuvbq2bcqwltkiqinhad.onion
🌐 Tor66 – http://tor66sewebgixwhcqfnp5inzp5x5uohhdy3kvtnyfxc2e5mxiuh34iid.onion/
πŸ”₯ Torch – http://torchdeedp3i2jigzjdmfpn5ttjhthh5wbmda2rr3jvqjg5p77c54dqd.onion/
πŸš€ Venus Search Engine – http://venusoseaqnafjvzfmrcpcq6g47rhd7sa6nmzvaa4bj5rp6nm5jl7gad.onion
πŸ—‚ Atlas Directory – http://atlasdiryizcd624oxcx7osaxhlxbfputd5ar3ywadckfpvjjk2xhnqd.onion/
πŸ”Ž Bobby – http://bobby64o755x3gsuznts6hf6agxqjcz5bop6hs7ejorekbm7omes34ad.onion/
🌍 Dargle.net (Clear Web) – http://www.dargle.net
βœ… Dark Net Trust Vendor Search – http://dntrustmuq5ccf3lygrnhsprpdliakq7r2ljsspczmdsslj5wl4teeid.onion/

Using these tools helps security teams trace leaked data, vendor reputations, and threat actor chatter fast.
🎯 AUMINT.io feeds real dark web intel into training simulations so your team can recognize threats before they escalate.

πŸ“ž Want to turn threat hunting into your strongest defense? Let’s connect and start your journey.

#DarkWebIntel #ThreatHunting #CyberSecurity #SocialEngineering #FraudPrevention #AUMINTio #CISO #SOC #ThreatIntel

read more

Manufacturing’s New Battleground: Why Digital Factories Are Becoming Prime Cyber Targets

⚠️ Factories Are Being Hacked From the Inside Out

πŸ“Œ Manufacturing teams are now exposed to 300% more social engineering attacks than just a year ago.
πŸ“Œ Deepfake audio, QR code traps, and spoofed procurement emails are fooling even veteran factory staff.
πŸ“Œ It’s not about malware anymore – it’s about manipulating humans on the floor.

πŸ” Most manufacturers don’t realize their digitization journey has outpaced their cyber resilience.

🧠 While systems get smarter, attackers are getting more personal.
πŸ§ƒ Just one click from a plant technician can halt operations across an entire supply chain.
πŸ“² And with mobile-based smishing and deepfakes, the risk doesn’t stay within the walls of your factory.

βš™οΈ Manufacturers must ask: Are your people part of the solution – or your biggest vulnerability?

πŸ’‘ At AUMINT.io, we’re helping factories test, train, and transform their human firewall with real-world social engineering simulations.

🎯 Want to see if your OT team could fall for a credential trap or QR bait?
Let’s find out together: https://calendly.com/aumint/aumint-intro

#CyberSecurity #SocialEngineering #ManufacturingSecurity #OTSecurity #CISO #CTO #FactoryOps #SupplyChainSecurity

read more

A Simple Guide to AI Security

An interactive walk-through of the OWASP GenAI Incident Response Guide, designed for everyone. What is an AI Incident? Think of AI as a brilliant but very literal-minded new employee. It's amazing at its job, but it can be tricked, make weird mistakes, or be used by...

read more