Coronavirus

Why Today’s Remote Workforce May Be Permanent

Malcolm Harkins is a member of the Cyber Resilience Think Tank, and a guest writer for Cyber Resilience Insights.  The changes to work – not just your new home office, but also the constant contraction/expansion of the economy –…

Read More
Security, Email Security, Coronavirus

Will Coronavirus Finally Move You to Multi-factor Authentication for Email Security?

Multi-factor authentication can play an important role in keeping remote workers—and your corporate network—secure during the COVID-19 crisis, if you let it. Key Points: As employees go home to work by the millions, bad actors see a huge…

Read More
Security, Threat Intelligence Hub, Coronavirus

Threat Intelligence Briefing: Skyrocketing Coronavirus Cyber Attacks Spur Increasing Security Cooperation

We’re continuing to see an unprecedented level of malicious activity as the COVID-19 pandemic unfolds, with threat actors shifting their focus to prey on the latest evolving anxieties of people who are working at home or self-isolating due to h…

Read More
Security, Email Security

Beyond Layer 7: Carbon-based Vulnerability and Business Risk

Sam Curry is a member of the Cyber Resilience Think Tank, and a guest writer for Cyber Resilience Insights.  The Open Systems Interconnection model (OSI) for computer communications has roots in the 70s and early 80s and uses a 7-layer ab…

Read More
Security, Threat Intelligence Hub

VelvetSweatshop Microsoft Excel® Spreadsheet Encryption Rises Again to Deliver LimeRAT Malware

Editor’s note: Thanks to Mimecast Threat Center’s Doron Attias and Tal Dery for this discovery. Microsoft Excel’s standard file encryption capabilities can be used to obfuscate and deliver malware. Mimecast Threat Center researchers…

Read More
Security, Coronavirus

When Chaotic Systems Collide: The Dance Between Biology and Cybersecurity

Sam Curry is a member of the Cyber Resilience Think Tank, and a guest writer for Cyber Resilience Insights.  Author Yuval Noah Harrari in Sapiens highlights an important distinction between types of chaotic systems: first order systems can be ex…

Read More
Security, Email Security, Threat Intelligence Hub, Coronavirus

Coronavirus Phishing Attacks Speed Up Across the Globe

Unsafe clicks from COVID-19-themed email phishing attacks nearly double in recent weeks; Mimecast blocks up to 5,000 URLs related to the Coronavirus a day—37x what we blocked in January. Security professionals in organizations attempting to per…

Read More
Security, Email Security, Coronavirus

Threat Intelligence Briefing: Cybercriminals Weaponizing Keywords in Coronavirus Phishing Attacks

Coronavirus Phishing Attacks and Domain Registrations Increase Dramatically This week’s Global Cyber Threat Intelligence Weekly briefing was the first in an ongoing series of interactive web sessions from Mimecast with the mission of helping c…

Read More
Archiving, Data Protection, Coronavirus

Cloud Collaboration Tools Show Leadership in Business Continuity

After initial business continuity ‘hiccups,’ cloud collaboration tools bounce back with surprising resilience; they focus on core functions, letting peripheral functions lag. Key Points: Millions of new remote workers swarm onto cloud co…

Read More
Security, Email Security

Business Email Compromises Causes U.S. Companies to Lose $1.7B

The FBI says business email compromise is now the biggest cause of cybercrime financial losses for U.S. organizations. But ransomware attacks are also on the rise again.  Key Points: &n…

Read More
Security, Threat Intelligence Hub, Coronavirus

Beware of Quickly-Evolving Coronavirus Email Phishing Attacks

Cyber criminals continually morph COVID-19 phishing scams to exploit what people are most anxious about at any given moment. Key Points: As every organization you’ve ever touched emails to let you know their coronavirus plans, email phishers a…

Read More
Coronavirus

Mimecast Continues Coronavirus Preparedness and Response

To help prevent the spread of COVID-19 and help keep our communities safe throughout the globe, last week Mimecast suspended all cross-border travel, limited domestic travel and advised employees to postpone events with 15 or more people. At tha…

Read More
Coronavirus

10 Steps To Maintain Web Security (And Sanity) While Working From Home During Coronavirus

Governments across the globe have put extreme measures in place to limit the spread of coronavirus, prohibiting large public gatherings, closing schools and day care facilities, and encouraging “social distancing” to keep new coronavirus…

Read More
Awareness Training, Threat Intelligence Hub, Coronavirus

Cyber Awareness: Top 3 Steps to Combat Cyber Disruption, Chaos and Profiteering

By now, COVID-19, or coronavirus, has likely dominated conversations and elicited new behavior at work, school, and home, given the rapid spread. But while we shift daily life and routines, the threat intelligence landscape is shifting as well: thre…

Read More
Security, Email Security, Coronavirus

Mimecast’s Preparedness and Response to Novel Coronavirus (COVID-19) Pandemic

Our hearts go out to everyone who has been affected by the COVID-19 virus in any way.  The health and safety of our employees, customers and partners and their families is one of our deepest concerns during this time. As the virus continues to s…

Read More
Security, Coronavirus

HIMSS: Coronavirus Cancellation a Hiccup or Opportunity for Healthcare Security?

As many of you know last Thursday HIMSS announced it was “clearly necessary to cancel the 2020 HIMSS Global Health Conference & Exhibition following the many reports from the World Health Organization (WHO) and the Cent…

Read More
Threat Intelligence Hub

New Cyber Threat Intelligence Report Reveals the Rise of Emotet

The Mimecast Threat Center launched the Threat Intelligence Report: RSA Conference Edition today, finding a 145% increase in attack campaigns across the globe from October to December. Researchers believe the increase can be attributed to Emotet&rsq…

Read More
Security

How to Address Cybersecurity Vendor Acquisitions

How to Address Cybersecurity M&A in Your Security Environment The role of cybersecurity and the overall importance of ensuring CISOs have a seat at the table for the acquisition process in its entirety is well documented; the value of data and t…

Read More
Security, Threat Intelligence Hub

Microsoft Issues Windows CryptoAPI / CVE-2020-0601 Patch

In the first Patch Tuesday of 2020, Microsoft has released a new patch for a serious Windows vulnerability, CVE-2020-0601, or the Windows CryptoAPI Spoofing Vulnerability. The vulnerability has grave implications for machines running 32- or 64-bit W…

Read More
Security, Threat Intelligence Hub

Tax Identify Theft is Increasing During Tax Season

With the 2020 tax season underway, cybersecurity analysts are seeing an increase in the number of impersonation attacks focused on stealing personal information through voice phishing, texts, and email. According to the Daily Mirror and other news s…

Read More
Security, Threat Intelligence Hub

Criminals Target American Infrastructure with Phishing and Malware

Enterprise networks throughout the United States are experiencing an escalation of phishing and malware attacks orchestrated by technologically advanced criminal groups around the world. With the intent of stealing data, profitin…

Read More
Security, Threat Intelligence Hub

Mimecast Discovers MDB Leaker: Microsoft Access Vulnerability CVE-2019-1463

The Security Implications of an Apparent Memory Leak in the Microsoft Access Database Editor’s note: Thanks to Mimecast Research Labs’ Ofir Shlomo and Tal Dery for this discovery. In January 2019, Mimecast Research Labs discovered and …

Read More
Security

4 Requirements to Protect Your Brand Against Exploits

The increasingly digital global economy has created a “perfect storm” for cyber attackers. As our reliance on websites and email to interact with organizations has grown, so too has the opportunity for criminals who are increasingly prey…

Read More