Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.

According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.

The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.

The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.

According to DZNet:  Mimecast says hackers abused one of its certificates to access Microsoft accounts.

Mimecast, a provider of email management software, said learned of the security incident from Microsoft.

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

🔒 Your Team Could Be Your Biggest Cyber Risk

Technology isn’t the only entry point for hackers.

Employees accidentally expose your org every day:
• Misconfigured cloud storage
• Over-shared info on social media
• Weak passwords and reuse

AUMINT’s Attack Surface Report reveals these human-layer threats.

All for €1,500, with actionable fixes.

Don’t wait for a breach.

🚀 Book your security snapshot: https://calendly.com/aumint/aumint-intro

#HumanRisk #CISO #CyberDefense #SOC #InfoSecEurope #GDPR #AttackSurface #AUMINT

read more

Paying Ransoms? You Might Be Paying Again – And Again

💸 Paying Ransoms? Expect Repeat Attacks Soon

Nearly 80% of organizations that pay ransom demands face a second attack – often from the same cybercriminals.

Some see follow-up attacks within just weeks, with ransom demands rising by over 20%.

Paying doesn’t guarantee data recovery or safety from exposure. Many victims report corrupted or stolen data despite paying.

This reveals a harsh truth: paying ransom is a temporary fix that invites future risks and costs.

Your organization needs a shift – from reacting after an attack to preventing it altogether.

At AUMINT.io, we help you build defenses that detect ransomware early and protect your critical data long-term.

Don’t wait until it’s too late.

Book a Consultation with AUMINT.io

#Cybersecurity #Ransomware #ThreatIntelligence #DataProtection #SecurityAwareness #CISO #ITSecurity

read more

Scattered Spider: The Silent Threat Exploiting IT Support Teams

🕸️ Scattered Spider’s Sneaky Attack on IT Support Teams

The most dangerous cyberattacks don’t always come from code – they come from exploiting human trust.

Scattered Spider, a cybercriminal group from the US and UK, has mastered this by targeting IT support teams with sophisticated voice phishing (vishing) and impersonation.

By pretending to be legitimate employees, they trick IT teams into resetting passwords or bypassing multi-factor authentication (MFA). This approach slips past even strong technical defenses.

What’s more alarming? They partner with ransomware-as-a-service groups like DragonForce to launch full-scale attacks after gaining entry.

This shows why strengthening human defenses is now as crucial as firewalls and antivirus software.

Want to learn how to protect your IT teams and your business from such stealthy threats?

At AUMINT.io, we specialize in tailored cybersecurity solutions that combine real-time threat intelligence with behavioral analytics to detect and block these human-centric attacks.

Don’t wait for a breach – take control now.

Book a Consultation with AUMINT.io

#Cybersecurity #SocialEngineering #ITSupport #FraudPrevention #SecurityAwareness #CISO #SecurityOps #ThreatIntelligence

read more