Security, Threat Intelligence Hub

Exploit Using Microsoft Excel Power Query for Remote DDE Execution Discovered

Mimecast Threat Center discovered a weakness in the Microsoft Excel tool that allows embedding malicious payloads remotely. Summary (Editor’s note: The Mimecast Threat Center team would like to acknowledge the contributions of team member Doro…

Read More
Security, Email Security

Ransomware Strikes Airline Parts Supplier

High-profile attacks highlight the need for advanced protection for all. It’s been a bad month for big ransomware attacks globally, and now another huge one has crippled a manufacturer in one of the world’s most critical industries. As r…

Read More
Security, Email Security

What's Your Cybersecurity Net Worth?

Calculating your cybersecurity net worth doesn't have to be complex.  Every public and private company maintains a set of financial documents to keep track of their assets and liabilities in order to determine their net worth. These reports inc…

Read More
Security, Email Security

Survey Says: Ransomware is Still a Top Threat for Most Organizations

Mimecast’s State of Email Security Report shows ransomware attacks aren’t slowing down. Don’t be lulled by crypto-mining (or cryptojacking) alarmists into thinking that crypto-mining is replacing ransomware as a major new security …

Read More
Archiving, Archive and Data Protection

How Financial Firms Control Compliance Costs

Is your firm ready to face today's business and regulatory needs? Financial services firms face some of the world’s toughest regulatory pressures. And yet, most compliance programs have not scaled with the needs of the business or evolving reg…

Read More
Security, Email Security

Prevent, Don’t Remediate: Three Cybersecurity Requirements

It’s never a bad time to pause and reflect on the vision for your IT security strategy. Is your IT security strategy based on “protecting your information assets from malicious code and cyber terrorists” or is it “preventing…

Read More
Security, Security Awareness Training

The Rising Tide of Cyber Awareness Training in Today’s Enterprise

Adoption is rising, but is it happening fast enough? Here’s a stark reality: no matter how good your employees are at their jobs they still usually pose your biggest security risk. Human error ranks even higher for cyber risk than software fla…

Read More
Security, Email Security

How Many IT Security Tools Do You Need?

How many IT Security tools are you currently using to keep your IT environment secure? Odds are, it’s too many. There’s a big, big problem taking hold in the IT world today: IT/security teams are constantly expanding tooling and architec…

Read More
Security, Email Security

Inadequate Cybersecurity Measures

Good enough security isn't good enough. Just checking the cybersecurity box with a few well know measures is not enough with today’s extremely sophisticated cybercriminals and even Ransomware as a Service offerings. It is the equivalent of an …

Read More
Security, Email Security

Real Examples of Threats Missed by Email Security Systems

A new view of the Mimecast Email Security Risk Assessment. With this blog I am happy to bring you the 9th consecutive quarterly release of our Mimecast Email Security Risk Assessment (ESRA) aggregate report, also with its associated funnel infograph…

Read More
Security, Email Security

Obfuscated Fileless Malware in Cyberattackers' Toolkits: A Closer Look

The latest from Mimecast Research Labs includes a malware technique never observed previously. Introduction Fileless malware has become an increasingly popular technique among cyberattackers because it reduces the defender’s ability to detect …

Read More