Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.

According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.

The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.

The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.

According to DZNet:  Mimecast says hackers abused one of its certificates to access Microsoft accounts.

Mimecast, a provider of email management software, said learned of the security incident from Microsoft.

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

The New Face of Social Engineering – Why Your Employees Are the Target

Social engineering is evolving fast – are you ready?

📢 Deepfake CEO scams, AI-driven phishing, and MFA bypass attacks are making traditional security useless. Cybercriminals aren’t hacking your systems – they’re hacking your people.

🛑 Firewalls won’t stop an employee from approving a fake request. The only defense is real-time AI detection and behavioral security.

🔍 AUMINT.io detects AI-generated attacks, impersonation fraud, and social engineering tactics before they succeed. Your security strategy needs to evolve – fast.

Protect your business before it’s too late.

#Cybersecurity #SocialEngineering #DeepfakeFraud #BusinessSecurity #ThreatIntelligence #AIThreats

read more

The Hidden Weak Link: Why Supply Chain Security Is the Ultimate Cyber Battleground

🔓 Your Supply Chain Is Your Biggest Cybersecurity Risk – Here’s Why

🚨 One weak vendor can take down your entire organization. The SolarWinds attack proved how cybercriminals infiltrate trusted software to unleash chaos. Are your third-party providers truly secure?

📉 Modern software dependencies are a hacker’s playground. Open-source libraries, APIs, and cloud services create invisible entry points for attacks like dependency confusion and repository hijacking.

🛡️ Proactive security is the only solution. ASPM helps monitor vulnerabilities, enforce zero-trust, and block threats before they strike. Is your security posture ready?

🔗 Act now – Secure your supply chain with AUMINT.io!

#Cybersecurity #SupplyChainSecurity #ASPM #CyberThreats #DataProtection

read more

The Silent Heist: How Email Fraud Is Costing Businesses Millions – And How to Stop It

📧 It starts with a simple email… and ends in a multi-million dollar loss. Cybercriminals are executing sophisticated Business Email Compromise (BEC) scams, mimicking trusted contacts to deceive employees. 🚨 FBI reports $50B+ lost worldwide!

🔍 Why are these scams so dangerous?
✅ They bypass traditional security – No malware, just social engineering.
✅ They exploit trust – Emails look real, urgent, and convincing.
✅ They target individuals – Attackers study internal email patterns.

🛡️ Protect your business NOW – Book a free consultation with AUMINT.io.

#CyberSecurity #EmailFraud #BEC #BusinessSecurity

read more