Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.

According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.

The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.

The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.

According to DZNet:  Mimecast says hackers abused one of its certificates to access Microsoft accounts.

Mimecast, a provider of email management software, said learned of the security incident from Microsoft.

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

🔥 Hackers Exploit What You Don’t See. Are You Ready?

Most security tools scan your known assets.

But attackers look beyond — at forgotten servers, leaked credentials, and employee mistakes.

AUMINT’s €1,500 Attack Surface Report gives you the full picture.

See the invisible, fix the unseen.

🔗 Book your session: https://calendly.com/aumint/aumint-intro

#CyberThreats #CISO #SOC #AttackSurface #InfoSecEurope #CyberSecurity #AUMINT

read more

Why EMEA Enterprises Are Prime Targets for Vendor Email Compromise

📧 Why EMEA Enterprises Face Higher VEC Risks

Vendor Email Compromise (VEC) is skyrocketing in EMEA, with 72% of employees at large enterprises engaging with suspicious vendor emails — that’s nearly double the engagement rate of Business Email Compromise (BEC) attacks.

Even more alarming? EMEA organizations report just 0.27% of VEC incidents, the lowest rate worldwide, leaving many attacks undetected and unresolved.

The telecom sector and junior sales staff are especially vulnerable, with engagement rates hitting 71% and 86% respectively.

This data reveals a troubling pattern: EMEA enterprises tend to trust vendor emails too easily, creating an entry point for costly cyber fraud.

Preventing VEC demands more than technology—it requires proactive employee training, awareness, and advanced AI-driven detection.

At AUMINT.io, we tailor cybersecurity defenses to EMEA’s unique challenges to stop VEC before it causes damage.

Take control of your security today.

Book a Consultation with AUMINT.io

#Cybersecurity #VEC #EMEA #EmailSecurity #ThreatIntelligence #CISO #SecurityAwareness

read more

Your passwords might already be exposed without you knowing it.

Your passwords might already be exposed online today.

🔐 Many people don’t realize their passwords could be leaked and abused.
🕵️‍♂️ Trusted leak-checking services can quickly reveal if your critical passwords are at risk.
⚠️ Ignoring this leaves your accounts and sensitive data vulnerable to hackers – Check if your super secret bank password is out there:
➡https://haveibeenpwned.com/
➡https://howsecureismypassword.net/
➡https://spycloud.com/check-your-exposure
➡https://leakcheck.appspot.com/
➡https://monitor.firefox.com/
➡https://ghostproject.fr/
➡https://breachalarm.com/

📈 AUMINT.io trains teams to spot and prevent breaches before they happen.
📞 Ready to secure your passwords and your organization? Let’s talk.

#CyberSecurity #PasswordSecurity #DataBreach #InfoSec #AUMINTio

read more