Mimecast Threat Intelligence Hub

Image of threat map for mobile devices

Popular Posts

Threat Intelligence Articles

Email Security, Threat Intelligence Hub

Anatomy of a Sustained BEC Attack on Microsoft 365 Users

Cyberattackers lurked in victims’ Microsoft 365 email accounts for months, first to divert $15 million, and then to prevent detection of their email compromise. Key Points: A recent global business email compromise campaign, now under investig…

Read More >

Email Security, Threat Intelligence Hub

Threat Intelligence Briefing: Pandemic Fallout Strains Cybersecurity and Resilience

All organizations’ cybersecurity resilience is in greater peril as the global COVID-19 pandemic continues to add to and reshape cyber risk. Key Points: Pandemic fallout such as businesses accelerating their cloud migrations, more work from hom…

Read More >

Threat Intelligence Hub

More than Meddling: Phishing Email Scams Exploit Political Brands

Businesses now face growing risk from phishing email attacks that prey on people’s political opinions, mirroring the COVID-19 cybercrime surge that preyed on fear.  Key Points: Cybercriminals’ two favorite techniques are to exploit …

Read More >

Threat Intelligence Hub

The Power of Predictive Threat Intelligence

Refocusing threat intelligence from identifying who is behind an attack to predicting what type of attack will occur is a better way to counter cyber threats. Key Points: The traditional approach to threat intelligence– centered around attribu…

Read More >

Threat Intelligence Hub

The Cybersecurity Threat to UK Healthcare

National Cyber Security Centre (NCSC) advisories and open source media reporting have identified cybercriminal groups targeting individuals, SMBs, and large enterprises, including those in the healthcare sector, with COVID-19 related scams and phishi…

Read More >

categories

Read More >

View More

Mimecast Discoveries