Threat Intelligence Hub
Mimecast Discovers MPP Bleed, a Mic…
New Mimecast research demonstrates how C…
Read More >
New Mimecast research demonstrates how CVE-2020-1322 potenti… Read More >
Successful organizations rely on Mimecast's 3.0 Email Security approach and comprehensive cybersecurity, resilience and compliance platform to protect email, data, users and web.
Get to know our comprehensive cyber security, resilience and compliance platform to protect your organization's email, data, users and web.
Keep your customers safe from evolving cyber threats by leveraging Mimecast’s proven email, web, awareness training, data protection and uptime assurance. Become the trusted advisor for your customers.
Keep your customers safe from evolving cyber security threats
Become a PartnerFind resources to help bolster cyber resilience at your organization
Read nowWe know that successful customers don’t just require great products but also training, education and flawless implementations. That’s why we’ve created the Legendary Customer Success program because we want our customers to be legends.
Tens of Thousands of Customers Rely on Mimecast Every Day
Hear More From ThemMimecast is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and bolster cyber resilience. Mimecast helps organizations stand strong in the face of cyberattacks, human error and technical failure.
Brand Protection Threat Intelligence Hub
Web Security Threat Intelligence Hub
Email Security Threat Intelligence Hub
Email Security Threat Intelligence Hub
Email Security Archive and Data Protection
Threat Center researchers provide technical analysis of threats that emerge in the first six months of the year. Its aim? To provide in-depth information about the nature of attack campaigns, to observe and anticipate the evolving nature of these threats, and to provide a set of recommendations to help guide cybersecurity practices. Download the report to see how businesses in the U.S. and Caribbean were impacted by attacks in the face of a global pandemic.
Read NowBlack Hat USA Edition, August 2020
Threat Center researchers analyzed how the global spread of COVID-19 opened up new opportunities for threat actors in the first months of 2020. As users worked from home and conflicting information spread around the world, threat actors exploited these vulnerabilities and caused alarming spikes in spam/opportunistic detections, impersonation, malware and malicious links. Download the report to see new attack volumes, and to understand how Mimecast can mitigate the risk.
Read Now100 Days of COVID-19 Research Report
Threat Center researchers provide technical analysis of threats that emerge throughout the quarter; its aim is to provide in-depth information about the nature of attack campaigns, to observe and anticipate the evolving nature of these threats, and to provide a set of recommendations to help guide cybersecurity practices. Download the report to see how your region and sector were affected by attacks.
Read NowThreat Intelligence Report 2020
The Mimecast Threat Center analyzed billions of emails from July through September of 2019, and explored the major campaigns impacting Australia, Germany, South Africa, the U.K. and U.S. Find out what trends they uncovered during this period.
Read NowThreat Intelligence Report November 2019
The Mimecast Threat Intelligence Report capitalizes on research conducted by the Mimecast Threat Center that provides analysis of 67 billion rejected emails. The research reinforces a previously observed trend: malware-centric campaigns are becoming increasingly sophisticated and complex, often using different pieces and types of malware in different phases of the attack. In addition, the research also highlights the continued use of well-known malware within attacks, which is easily identified and blocked, as well as simple social engineering tactics intended to fool victims.
Read NowThreat Intelligence Report: Black Hat Edition 2019
Big budget or not, CISOs must make threat intelligence a priority and learn how to focus on only the data that matters—data that will help mitigate future risks.
Though the technical definition of threat intelligence may change depending on who you ask, one factor remains constant: If threat intelligence isn’t part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse.
Read this Cyber Resilience Think Tank executive strategy guide to develop a plan to architect a threat intelligence program in your organization.
Read NowThreat Intelligence: How Every CISO Can Make it a Priority
New Mimecast research demonstrates how C…
Read More >
New Mimecast research demonstrates how CVE-2020-1322 potenti… Read More >
New Mimecast research demonstrates how C…
Read More >
New Mimecast research demonstrates how CVE-2020-1321 potenti… Read More >
Editor’s note: Thanks to Mimecast …
Read More >
Editor’s note: Thanks to Mimecast Threat Center’… Read More >
The Security Implications of an Apparent…
Read More >
The Security Implications of an Apparent Memory Leak in the … Read More >
Understand the security implications of …
Read More >
Understand the security implications of the latest patched M… Read More >
DMARC can help protect brands from email domain spoofing. The problem is that not enough organizations are enforcing on DMARC yet. Key Points: The Cutwail botnet continues to be very active and often spoofs the brands of well-known organizations via…
Threat actors steal ‘white hat’ tools, but FireEye publishes countermeasures to help the cybersecurity community thwart their use. The cyberattack on FireEye, revealed earlier this week, elevates cyber risk for all organizations. But than…
Cyberattackers lurked in victims’ Microsoft 365 email accounts for months, first to divert $15 million, and then to prevent detection of their email compromise. Key Points: A recent global business email compromise campaign, now under investig…
All organizations’ cybersecurity resilience is in greater peril as the global COVID-19 pandemic continues to add to and reshape cyber risk. Key Points: Pandemic fallout such as businesses accelerating their cloud migrations, more work from hom…
Businesses now face growing risk from phishing email attacks that prey on people’s political opinions, mirroring the COVID-19 cybercrime surge that preyed on fear. Key Points: Cybercriminals’ two favorite techniques are to exploit …
New Mimecast research demonstrates how C…
Read More >
New Mimecast research demonstrates how CVE-2020-1322 potenti… Read More >
New Mimecast research demonstrates how C…
Read More >
New Mimecast research demonstrates how CVE-2020-1321 potenti… Read More >
Editor’s note: Thanks to Mimecast …
Read More >
Editor’s note: Thanks to Mimecast Threat Center’… Read More >
The Security Implications of an Apparent…
Read More >
The Security Implications of an Apparent Memory Leak in the … Read More >
Understand the security implications of …
Read More >
Understand the security implications of the latest patched M… Read More >