Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.

According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.

The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.

The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.

According to DZNet:  Mimecast says hackers abused one of its certificates to access Microsoft accounts.

Mimecast, a provider of email management software, said learned of the security incident from Microsoft.

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

⚠️ One Exposure Can Cost Millions – Don’t Risk It

Ransomware, data leaks, phishing – they start small.

Hidden misconfigurations and oversights become attack gateways.

For €1,500, AUMINT’s report finds these gaps before attackers do.

Take control. Protect your assets.

🛡️ Book your assessment now: https://calendly.com/aumint/aumint-intro

#RiskManagement #CyberSecurity #InfoSec #CISO #SOC #AttackSurface #AUMINT

read more

Vendor Email Compromise: The Silent $300M Threat CISOs Can’t Ignore

📧 Vendor Email Compromise Is a $300M Silent Threat

Vendor Email Compromise (VEC) is skyrocketing, with 72% of employees at large enterprises engaging with fraudulent vendor emails by replying or forwarding—even when no links or attachments are present.

This behavior has fueled attempted thefts over $300 million worldwide last year.

VEC attacks now see engagement rates 90% higher than traditional Business Email Compromise (BEC).

The EMEA region is a hotbed for these attacks, yet employees there report only 0.27% of incidents—the lowest global reporting rate.

Telecom leads in vulnerability, with 71.3% employee engagement, followed by energy and utilities at 56.25%.

VEC’s danger lies in hijacking trusted vendor email threads and leveraging social engineering that exploits human trust, bypassing technical defenses like multi-factor authentication.

To fight back, organizations must adopt AI-powered email analytics, enforce vendor verification protocols, and continuously train employees to detect social engineering tactics.

At AUMINT.io, we deliver comprehensive cybersecurity solutions blending advanced threat detection and human-focused training to shield your organization.

Don’t wait for an attack to expose your vulnerabilities.

Book a Consultation with AUMINT.io

#Cybersecurity #VendorEmailCompromise #EmailSecurity #ThreatDetection #AUMINT

read more

Why CFOs Are the New Prime Targets in Cyberattacks

📧 CFOs Face Rising Spear-Phishing Threats

Spear-phishing attacks targeting CFOs and senior financial executives are escalating fast. Attackers use a deceptive recruiter email to trick victims into downloading tools like NetBird and OpenSSH, granting hackers remote access without raising alarms.

This method allows persistent, covert control of critical financial systems.

CFOs are high-value targets because of their ability to authorize large transactions and access sensitive data.

To defend against these threats, organizations need advanced detection systems that spot unusual activity early, plus focused executive training to recognize spear-phishing tactics.

At AUMINT.io, we provide tailored cybersecurity solutions combining cutting-edge threat detection and ongoing awareness programs to protect your top executives and critical assets.

Don’t wait for an attack to disrupt your business.

Book a Consultation with AUMINT.io

#Cybersecurity #CFO #SpearPhishing #EmailSecurity #ThreatDetection #AUMINT

read more