Cyber Resilience Insights

SUBSCRIBE NOW

Security
Threat Intelligence Report: Cybercriminal Go-To-Market Strategies

Mass market vs. targeted marketing: Techniques and technology behind these two strategies … Read More >

Mass market vs. targeted marketing: Techniques and technology behind these two strategies Do cybercriminals have different go-to-market strategies? Does this strike you as a weird question to ask? Don’t only legitimate organizations have market strategies? In my view, given that most cybercri… Read More >

Matthew Gardiner

by Matthew Gardiner

Director of Enterprise Security Campaigns

Posted Aug 15, 2019

Security
“The State of Email Security 2019” – Email-Borne Threat…

The Real Cost of Data Loss and… Read More >

The Real Cost of Data Loss and Why it Hurts so Much When digital data or sensitive content falls into the wrong hands, … Read More >

Matthew Gardiner

by Matthew Gardiner

Director of Enterprise Security Campaigns

Posted Aug 08, 2019

Security
13 Tips for Good Cyber Hygiene at Black Hat and DEF CON…

Black Hat and DEF CON are two… Read More >

Black Hat and DEF CON are two seminal cybersecurity and hacker events that showcase the latest devices and capabilities… Read More >

Carl Wearn

by Carl Wearn

Posted Jul 26, 2019

Security
Phishing Attacks on File-Sharing Services Show Sharing Isn’t Always Caring

How we can combat phishing attacks on Dropbox, OneDrive, Google Drive and more.  Ther… Read More >

How we can combat phishing attacks on Dropbox, OneDrive, Google Drive and more.  There are multiple ways in which attackers abuse the convenience of cloud-based services in our current cyber landscape. In my latest research, which I will be presenting at Black Hat 2019 on August 7, I have delve… Read More >

Sevtap Duman

by Sevtap Duman

Security Research Engineer

Posted Jul 25, 2019

Security
3 Keys to Advanced Threat Protection

How should your organization deal with Advanced Threat Protection?  Every IT security… Read More >

How should your organization deal with Advanced Threat Protection?  Every IT security professional and their Chief Information Security Officer, understands Advanced Threat Protection is a key competent to a successful security infrastructure. Constant Advanced Threat Protection research a… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Jul 24, 2019

Security
New Phishing Attack Emerges using SHTML file attachment…

New phishing tactic identified… Read More >

New phishing tactic identified in latest threat intelligence research from Mimecast’s Threat Center In early April… Read More >

Tomasz  Kojm

by Tomasz Kojm

Senior Engineering Manager

Posted Jul 17, 2019

Popular Posts

Older Posts

Continuity, Security, Cyber Resilience for Email, Awareness Training

Internal Security Threats: A Problem that Continues to Get Worse

Mimecast’s “The State of Email Security 2019” report shows continued challenges from compromised and careless users Most organizations are heavily focused on protecting their organizations from inbound attacks coming directly from c…

Read More >

Security, Cyber Resilience for Email, Awareness Training

Email Attacks in the Real World: Examples For Your Resilience Strategy

Take lessons from the past in building your organization's cyber resilience strategy.  The 2019 State of Email Security report highlights some of the most alarming trends in the world of email security, but also examines how organizations are us…

Read More >

Security

Exploit Using Microsoft Excel Power Query for Remote DDE Execution Discovered

Mimecast Threat Center discovered a weakness in the Microsoft Excel tool that allows embedding malicious payloads remotely. Summary (Editor’s note: The Mimecast Threat Center team would like to acknowledge the contributions of team member Doro…

Read More >

Security

Zero-Day Exploits Explained

There are literally hundreds, if not thousands or approaches cyber criminals can use to exploit your IT infrastructure and access sensitive data.  Once an exploit is discovered it can be dealt with using signature-based technologies that scan …

Read More >

categories

Read More >

View More

Popular Posts