Cyber Resilience Insights

SUBSCRIBE NOW

Security
New Phishing Attack Emerges using SHTML file attachments

New phishing tactic identified in latest threat intelligence research from Mimecast’… Read More >

New phishing tactic identified in latest threat intelligence research from Mimecast’s Threat Center In early April, the Mimecast Threat Center team was alerted to a rare type of server-parsed HTML (SHTML) based phishing attack emerging from the UK. When users opened attachments in these phishi… Read More >

Tomasz  Kojm

by Tomasz Kojm

Senior Engineering Manager

Posted Jul 17, 2019

Continuity, Security, Cyber Resilience for Email, Awareness Training
Internal Security Threats: A Problem that Continues to …

Mimecast’s “The St… Read More >

Mimecast’s “The State of Email Security 2019” report shows continued challenges from compromised and c… Read More >

Matthew Gardiner

by Matthew Gardiner

Director of Enterprise Security Campaigns

Posted Jul 15, 2019

Security, Cyber Resilience for Email, Awareness Training
Email Attacks in the Real World: Examples For Your Resi…

Take lessons from the past in … Read More >

Take lessons from the past in building your organization's cyber resilience strategy.  The 2019 State of Email Secu… Read More >

Joshua Douglas

by Joshua Douglas

VP, Threat Intelligence

Posted Jul 10, 2019

Security
Exploit Using Microsoft Excel Power Query for Remote DDE Execution Discovered

Mimecast Threat Center discovered a weakness in the Microsoft Excel tool that allows embed… Read More >

Mimecast Threat Center discovered a weakness in the Microsoft Excel tool that allows embedding malicious payloads remotely. Summary (Editor’s note: The Mimecast Threat Center team would like to acknowledge the contributions of team member Doron Attias in the following research.) The Mimecast … Read More >

Ofir Shlomo

by Ofir Shlomo

Security Research Team Leader

Posted Jun 27, 2019

Security
Zero-Day Exploits Explained

There are literally hundreds, if not thousands or approaches cyber criminals can use to ex… Read More >

There are literally hundreds, if not thousands or approaches cyber criminals can use to exploit your IT infrastructure and access sensitive data.  Once an exploit is discovered it can be dealt with using signature-based technologies that scan for that signature and apply the appropriate measu… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Jul 09, 2019

Security
Ransomware as a Service: What to Know and How to Combat…

Here's what to know about a gr… Read More >

Here's what to know about a growing scourge. You may be surprised to know that Hollywood has created over 88 films cent… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Jul 08, 2019

Popular Posts

Older Posts

Security

Web-Based Social Engineering Attacks Taking Increasingly Popular Forms

These techniques include web site spoofing and web-based file sharing service exploits. Organizations and their security professionals must be prepared for nearly anything when it comes to how attackers will attempt to exploit them. A new report hig…

Read More >

Security

Cybersecurity Trends: Our Most Read Blogs of 2019 Q2

See what caught the eyes of Cyber Resilience Insights readers last quarter. With the second quarter of 2019 in the books, we wanted to provide you a one-stop shop for the most-read new content we posted on Cyber Resilience Insights during that time. …

Read More >

Security

Ransomware Strikes Airline Parts Supplier

High-profile attacks highlight the need for advanced protection for all. It’s been a bad month for big ransomware attacks globally, and now another huge one has crippled a manufacturer in one of the world’s most critical industries. As r…

Read More >

Security

What's Your Cybersecurity Net Worth?

Calculating your cybersecurity net worth doesn't have to be complex.  Every public and private company maintains a set of financial documents to keep track of their assets and liabilities in order to determine their net worth. These reports inc…

Read More >

categories

Read More >

View More

Popular Posts