Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.
According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.
The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.
The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.
According to DZNet: Mimecast says hackers abused one of its certificates to access Microsoft accounts.
Mimecast, a provider of email management software, said learned of the security incident from Microsoft.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
🔎 What If Your Biggest Risk Isn’t Even Inside Your Network?
Modern attacks start outside your perimeter – on public infrastructure, unsecured APIs, even social media.
Things like:
• Leaked employee credentials
• Misconfigured subdomains
• Untracked SaaS access
All of this lives outside your SIEM’s reach. But attackers find it fast.
Our €1,500 Attack Surface Report is a practical way to find and fix what they will exploit.
Not theory. Not fluff. Just real exposures mapped to business risk.
✅ Schedule your session here: https://calendly.com/aumint/aumint-intro
#CyberThreats #DigitalExposure #SOC #CISO #HumanRisk #AttackSurface #AUMINT
AI Deepfakes Are the New Insider Threat – And They Don’t Need a Badge
🎙️ Your CEO’s Voice Might Already Be Cloned
🚨 Deepfakes aren’t sci-fi anymore – attackers are cloning executives using AI-generated voice and video.
🧠 Fake Zoom calls, urgent Slack requests, and video voicemails are being used to trigger wire transfers, access credentials, and even shift entire workflows.
🎯 The human layer is now the easiest one to breach – and the hardest to secure.
🧩 All it takes is 30 seconds of publicly available audio to generate a convincing impersonation.
💼 Most companies aren’t prepared. Only a fraction are training executives to pause, verify, and act with skepticism – even when the voice on the line sounds like their boss.
🔒 If your team assumes a familiar voice means safety, your organization is already exposed.
At AUMINT.io, we simulate deepfake attacks, coach executive teams, and build muscle memory to spot and respond before the damage is done.
Don’t let synthetic voices make real decisions for your business.
Book Your Executive Security Simulation
#DeepfakeThreats #CyberSecurity #ExecutiveProtection #GenerativeAI #CISO #FraudPrevention #AIImpersonation #AUMINT #LeadershipSecurity #SMBSecurity
🚨 Most Breaches Start With What No One’s Monitoring
Your firewall’s great. Your endpoint’s locked. But what about:
• That marketing server left open to the internet?
• The HR doc exposed on a public repo?
• The developer whose GitHub mentions your internal domain?
Attackers LOVE this stuff. And they’re always looking.
For €1,500, AUMINT’s Attack Surface Report uncovers what’s really out there – and what you need to fix first.
Don’t wait for a pentest report after the damage is done.
💬 Let’s make the invisible visible: https://calendly.com/aumint/aumint-intro
#CyberSecurity #CISO #SOC #ShadowIT #InfoSec #EuropeCISO #AUMINT