Security, Threat Intelligence Hub
Exploit Using Microsoft Excel Power…
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Microsoft recently informed us that a Mimecast-issued certificate provided to certain cust… Read More >
Microsoft recently informed us that a Mimecast-issued certificate provided to certain customers to authenticate Mimecast Sync and Recover, Continuity Monitor, and IEP products to Microsoft 365 Exchange Web Services has been compromised by a sophisticated threat actor. Approximately 10 percent of our… Read More >
With cybercriminals increasing… Read More >
With cybercriminals increasingly well organized, companies must infuse cybersecurity awareness into their corporate cult… Read More >
DMARC can help protect brands from email domain spoofing. The problem is that not enough o… Read More >
DMARC can help protect brands from email domain spoofing. The problem is that not enough organizations are enforcing on DMARC yet. Key Points: The Cutwail botnet continues to be very active and often spoofs the brands of well-known organizations via email as part of its attacks. Though many well-kn… Read More >
Scaring employees is an ineffe… Read More >
Scaring employees is an ineffective way to make them cyber-vigilant, research finds. In fact, too much fear mongering ca… Read More >
European businesses are calling for urgent, unified action on a secure 5G network to catal… Read More >
European businesses are calling for urgent, unified action on a secure 5G network to catalyze innovation and competitive advantage. Key Points: Europe is lagging behind other regions in implementing 5G. Businesses have urged their governments to take action, spurring a flurry of policy initiatives… Read More >
COVID-19, remote work and data… Read More >
COVID-19, remote work and data privacy legislation are compelling companies to rethink their cybersecurity policies. Key… Read More >
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Since the dawn of social engineering, at…
Read More >
Since the dawn of social engineering, attack methodology has… Read More >
With Cybersecurity Awareness Month here,…
Read More >
With Cybersecurity Awareness Month here, we’re ready t… Read More >
Get posts like this delivered to…
Read More >
Get posts like this delivered to your inbox. Subscri… Read More >
Vaccine manufacturing and distribution companies are falling victim to cyberattacks across the globe. Key Points: Spear phishing attacks, most likely originating from nation states, are being waged against companies in the COVID-19 vaccine supply ch…
The value of cybersecurity tools can be greater than the sum of its parts — but only when they are used collectively in an integrated manner. Key Points: Comprehensive threat intelligence requires a diverse set of cybersecurity tools to keep u…
Reported authentication issue results in multiple service outages for cloud giant, causing global productivity disruption. Were you sweating in your pajamas on Monday as you realized that not only was your Google Nest thermostat down – nearly e…
Several developments in 2020 have made in-house e-discovery a higher priority for corporate counsels. Key Points Heightened regulatory action and increased threats to cybersecurity are contributing to a tougher legal landscape — and COVID has …
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Since the dawn of social engineering, at…
Read More >
Since the dawn of social engineering, attack methodology has… Read More >
With Cybersecurity Awareness Month here,…
Read More >
With Cybersecurity Awareness Month here, we’re ready t… Read More >
Get posts like this delivered to…
Read More >
Get posts like this delivered to your inbox. Subscri… Read More >