Security, Threat Intelligence Hub

Exploit entdeckt, der Microsoft Excel Power Query zur Ausführung von Remote-DDE nutzt

Mimecast Threat Center discovered a weakness in the Microsoft Excel tool that allows embedding malicious payloads remotely. Summary (Editor’s note: The Mimecast Threat Center team would like to acknowledge the contributions of team member Doro…

Lesen Sie mehr dazu
Security, Email Security

Zero-Day-Exploits erklärt

There are literally hundreds, if not thousands or approaches cyber criminals can use to exploit your IT infrastructure and access sensitive data.  Once an exploit is discovered it can be dealt with using signature-based technologies that scan …

Lesen Sie mehr dazu
Security, Email Security

Ransomware-as-a-Service: Was Sie wissen müssen und wie Sie dagegen vorgehen

Here's what to know about a growing scourge. You may be surprised to know that Hollywood has created over 88 films centered on hacking and/or the Dark Web between 1969 and 2017. If you are interested in the entire list check it out at a Cybersecurit…

Lesen Sie mehr dazu
Security, Email Security

Webbasierte Social-Engineering-Angriffe nehmen immer populärere Formen an

These techniques include web site spoofing and web-based file sharing service exploits. Organizations and their security professionals must be prepared for nearly anything when it comes to how attackers will attempt to exploit them. A new report hig…

Lesen Sie mehr dazu
Security, Email Security

Cybersicherheitstrends: Unsere meistgelesenen Blog-Beiträge des zweiten Quartals 2019

See what caught the eyes of Cyber Resilience Insights readers last quarter. With the second quarter of 2019 in the books, we wanted to provide you a one-stop shop for the most-read new content we posted on Cyber Resilience Insights during that time. …

Lesen Sie mehr dazu
Security, Email Security

Ransomware sorgt für Stillstand bei Flugzeugteile-Händler

High-profile attacks highlight the need for advanced protection for all. It’s been a bad month for big ransomware attacks globally, and now another huge one has crippled a manufacturer in one of the world’s most critical industries. As r…

Lesen Sie mehr dazu
Security, Email Security

Was ist Ihre Cybersicherheit wert?

Calculating your cybersecurity net worth doesn't have to be complex.  Every public and private company maintains a set of financial documents to keep track of their assets and liabilities in order to determine their net worth. These reports inc…

Lesen Sie mehr dazu
Security, Email Security

Umfrage: Ransomware bei den meisten Unternehmen immer noch große Bedrohung

Mimecast’s State of Email Security Report shows ransomware attacks aren’t slowing down. Don’t be lulled by crypto-mining (or cryptojacking) alarmists into thinking that crypto-mining is replacing ransomware as a major new security …

Lesen Sie mehr dazu
Archiving, Data Protection

So kontrollieren Finanzunternehmen ihre Compliance-Kosten

Is your firm ready to face today's business and regulatory needs? Financial services firms face some of the world’s toughest regulatory pressures. And yet, most compliance programs have not scaled with the needs of the business or evolving reg…

Lesen Sie mehr dazu
Security, Email Security

Verhindern, nicht korrigieren: Drei Anforderungen an die Cybersicherheit

It’s never a bad time to pause and reflect on the vision for your IT security strategy. Is your IT security strategy based on “protecting your information assets from malicious code and cyber terrorists” or is it “preventing…

Lesen Sie mehr dazu
Security, Awareness Training

Ein steigender Trend: Cyber-Awareness-Schulungen in modernen Unternehmen

Adoption is rising, but is it happening fast enough? Here’s a stark reality: no matter how good your employees are at their jobs they still usually pose your biggest security risk. Human error ranks even higher for cyber risk than software fla…

Lesen Sie mehr dazu
Security, Email Security

Wie viele IT-Sicherheitstools braucht man eigentlich?

How many IT Security tools are you currently using to keep your IT environment secure? Odds are, it’s too many. There’s a big, big problem taking hold in the IT world today: IT/security teams are constantly expanding tooling and architec…

Lesen Sie mehr dazu
Security, Email Security

Unzureichende Cybersicherheitsmaßnahmen

Good enough security isn't good enough. Just checking the cybersecurity box with a few well know measures is not enough with today’s extremely sophisticated cybercriminals and even Ransomware as a Service offerings. It is the equivalent of an …

Lesen Sie mehr dazu
Security, Email Security

Echte Beispiele für Bedrohungen, die von E-Mail-Sicherheitssystemen übersehen wurden

A new view of the Mimecast Email Security Risk Assessment. With this blog I am happy to bring you the 9th consecutive quarterly release of our Mimecast Email Security Risk Assessment (ESRA) aggregate report, also with its associated funnel infograph…

Lesen Sie mehr dazu