Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.

According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.

The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.

The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.

According to DZNet: Β Mimecast says hackers abused one of its certificates to access Microsoft accounts.

Mimecast, a provider of email management software, said learned of the security incident from Microsoft.

Read more about Examples and Numbers of Social Engineering attacks Β β€Ί

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

🚨 Top Dark Web Resources Every Security Pro Should Bookmark 🚨

Dark web research is no longer optional – it’s essential.
πŸ” Threat actors use hidden sites to trade stolen data and launch social engineering attacks.

Here are must-know darknet links that expose where hackers gather intel:

πŸ•΅οΈβ€β™‚οΈ DNM Bible V2 (Onion Link) – http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/bible.zip
πŸ•΅οΈβ€β™‚οΈ DNM Bible V2 Live (Onion Link) – http://biblemeowimkh3utujmhm6oh2oeb3ubjw2lpgeq3lahrfr2l6ev6zgyd.onion/
πŸ¦‰ Owledge (Onion Link) – http://owlzyj4to3l5daq6edgsgp5z4lh4tzlnms4z6jv6xdtkily77j4b3byd.onion
πŸ“¦ Security in-a-box (Onion Link) – http://lxjacvxrozjlxd7pqced7dyefnbityrwqjosuuaqponlg3v7esifrzad.onion/en/
🌐 The Hitchhiker’s Guide to Online Anonymity – https://anonymousplanet-ng.org/guide.html
πŸ’° XMRGuide (Onion Link) – http://xmrguide25ibknxgaray5rqksrclddxqku3ggdcnzg4ogdi5qkdkd2yd.onion/
🧩 I2P Search (Onion Link) – http://i2poulge3qyo33q4uazlda367okpkczn4rno2vjfetawoghciae6ygad.onion/
πŸ”Ž Dig Deeper (I2P) – http://kbbd6h7kg32va4indf7efc4rhdfet6zm7466fntzgc634va3k2pa.b32.i2p/
πŸ”Ž Dig Deeper (2) – http://dgnwtz36mhiro5rs36n7r5mxs2srzvhaaui5hfuceiy2nehhe2ha.b32.i2p/
⚠️ Dread (I2P Forum) – http://dreadtoobigdsrxg4yfspcyjr3k6675vftyco5pyb7wg4pr4dwjq.b32.i2p/

Knowledge is power. Understanding these sources gives your security team a real edge against fraudsters.

πŸ” At AUMINT.io, we integrate darknet intel into social engineering simulations, making training razor-sharp and relevant.

πŸ“ž Want to strengthen your defenses with cutting-edge threat data? Reach out to us today.

#CyberSecurity #DarkWeb #SocialEngineering #FraudPrevention #ThreatIntel #AUMINTio #CISO #SecurityOps #CyberAwareness

read more

76% of Android Apps Can Be Hacked With This 6-Second Trick – Why CISOs Should Care

⚠️ 76% of Android Apps Can Be Hacked – Here’s How

πŸ” A zero-permission app can hijack your taps, steal data, and even wipe your device. No overlays. No alerts. No chance to notice.

πŸ”₯ This is TapTrap – an animation-driven attack that works on Android 15, bypassing all current defenses.

βœ” Exploits a 6-second attack window caused by a system flaw.
βœ” Grants camera, location, and notification access without consent.
βœ” Escalates to device admin for full control.
βœ” Extends to web clickjacking, compromising browsers and MFA flows.

πŸ“Š Our findings:
βœ… 99,705 apps analyzed
βœ… 76.3% vulnerable
βœ… 100% of users in our study failed to detect it

Enterprise takeaway? This is a CISO issue. A single compromised phone can leak sensitive data, expose authentication codes, and break compliance.

πŸ‘‰ Want to see how this works and what defenses actually stop it?
Book your free TapTrap security briefing today.

#CyberSecurity #Android #MobileSecurity #CISO #CTO #RiskManagement

read more

Android 15 Is Still Vulnerable – How TapTrap Bypasses Every Defense

🚨 Android 15 Still Exposed – The Attack Nobody Saw Coming

⚠️ Imagine a zero-permission app silently hijacking your taps. No overlays. No SYSTEM_ALERT_WINDOW. No warnings.

πŸ“± This is TapTrap – a groundbreaking attack that bypasses every Android tapjacking defense using UI animations instead of overlays.

πŸ’₯ Here’s what makes it terrifying:
βœ… Works on Android 15 – the latest version
βœ… Grants camera, location, and notification access without you noticing
βœ… Can escalate to full device wipe or browser-based clickjacking
βœ… Exploits a flaw that doubles the attack window to 6 seconds

πŸ“Š We analyzed 99,705 Play Store apps:
βœ” 76.3% are vulnerable
βœ” User study: 100% of participants failed to spot it

πŸ” Security indicators? Easily masked. Privacy Dashboard? Doesn’t show the malicious app.

If you manage mobile security for your org, this is a wake-up call. A single compromised device can leak corporate data, break MFA, and open doors for phishing.

Ready to see how this attack works and how to defend before it hits your business?
Book a free TapTrap security briefing now.

#CyberSecurity #Android #MobileSecurity #CISOs #CTOs #RiskManagement #AppSec

read more