Mimecast, which provides email management systems, updates that the hacker was able to hack into the company’s systems and access customer information.

According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services located on Microsoft’s server.

The company also states that all customers who may have been harmed have been updated and it also asks all customers of the company to replace the existing certificate in their possession with a new certificate issued by the company.

The breach was identified by Microsoft, which updated Mimecast that an unidentified source accessed the company’s servers.

According to DZNet: ย Mimecast says hackers abused one of its certificates to access Microsoft accounts.

Mimecast, a provider of email management software, said learned of the security incident from Microsoft.

Read more about Examples and Numbers of Social Engineering attacks ย โ€บ

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

The Rising CISO: Bridging IT and OT Cybersecurity

๐Ÿ” CISOs Now Guarding OT Security

In 2025, over half of organizations now assign OT security to CISOs, up from 16% in 2022. This shift highlights the urgent need for integrated cybersecurity across IT and OT systems.

As OT networks become more connected to IT infrastructure, the potential impact of cyber threats on critical operations escalates. CISOs are now responsible for unifying defenses, leveraging AI-driven analytics, and implementing threat intelligence to prevent disruptions.

Organizations with integrated OT-IT security report up to a 93% reduction in incidents, demonstrating measurable results. Executives and security leaders must embrace this strategic change to safeguard critical assets and ensure operational continuity.

Future-proof your security posture โ€“ discover AUMINT.io solutions
.

#CISO #Cybersecurity #OperationalTechnology #ITSecurity #ExecutiveLeadership #EnterpriseRisk #AUMINT

read more

The Human Factor in Cybersecurity 2025 โ€“ Why People Are the Weakest Link

๐Ÿ›ก Human Error: Cybersecurityโ€™s Biggest Threat

Humans are the weakest link in 2025 cybersecurity. ๐Ÿ˜ฑ

Cybercriminals exploit trust, urgency, and authority to bypass technical defenses. ๐Ÿ’ก

Generative AI has made attacks ultra convincing. Emails, messages, and even voice calls now mimic executives or familiar contacts perfectly. ๐Ÿง 

Phishing and vishing campaigns trick employees into revealing credentials or approving fraudulent transfers. ๐Ÿ’ธ

Even trained teams can fall victim because attackers combine psychology and tech to create believable scenarios. โš ๏ธ

Organizations must focus on human-centric security. Multi-factor authentication, verification processes, and simulated social engineering exercises are essential. โœ…

AUMINT.io helps businesses identify human vulnerabilities and strengthen defenses. Learn how to protect your teams and sensitive data by scheduling a session today here
.

#CISO #HR #ITSecurity #FraudPrevention #SocialEngineering #AUMINT #CyberAwareness #ExecutiveSecurity

read more

The Subtle Snail Recruitment Trap โ€“ How Attackers Use Fake HR to Steal Credentials and Persist

๐Ÿšจ Recruitment-Style Phishing Is the New Front Line

๐Ÿ˜ฑ Researchers link an Iran-nexus group to recruitment lures that infected 34 devices across 11 organizations, using fake HR profiles to bait targets.

๐Ÿงฉ The bait looks real: tailored outreach, plausible interviews, and job documents that contain weaponized ZIPs or signed binaries which deploy loaders.

๐Ÿง  The payload family MINIBIKE steals credentials, logs keystrokes, and creates persistent backdoors for long-term espionage.

โš ๏ธ These campaigns hide traffic in Azure-hosted C2 and abuse DLL sideloading to evade detection, so standard AV often misses them.

โœ… Quick actions: treat unsolicited job attachments as untrusted; verify recruiter emails and LinkedIn profiles; sandbox any job-related archive before opening.

๐Ÿ” For security teams โ€“ simulate recruitment lures, tighten endpoint rules against DLL sideloading, and monitor cloud egress for anomalous C2.

๐Ÿ”Ž SEO note: use keywords like job, recruiter, LinkedIn, credential theft, MINIBIKE to surface this threat to practitioners and hiring teams.

๐Ÿ”’ AUMINT.io helps design simulations and detection playbooks that mirror this recruitment workflow. Book a 15-minute intro and get a tailored risk checklist: https://calendly.com/aumint/aumint-intro

#JobSeekers #CISO #HR #ITSecurity #AUMINT #ThreatIntel #RecruitingSecurity

read more