Security, Threat Intelligence Hub

Exploit entdeckt, der Microsoft Excel Power Query zur Ausführung von Remote-DDE nutzt

Mimecast Threat Center discovered a weakness in the Microsoft Excel tool that allows embedding malicious payloads remotely. Summary (Editor’s note: The Mimecast Threat Center team would like to acknowledge the contributions of team member Doro…

Lesen Sie mehr dazu
Security, Email Security

Ransomware sorgt für Stillstand bei Flugzeugteile-Händler

High-profile attacks highlight the need for advanced protection for all. It’s been a bad month for big ransomware attacks globally, and now another huge one has crippled a manufacturer in one of the world’s most critical industries. As r…

Lesen Sie mehr dazu
Security, Email Security

Was ist Ihre Cybersicherheit wert?

Calculating your cybersecurity net worth doesn't have to be complex.  Every public and private company maintains a set of financial documents to keep track of their assets and liabilities in order to determine their net worth. These reports inc…

Lesen Sie mehr dazu
Security, Email Security

Umfrage: Ransomware bei den meisten Unternehmen immer noch große Bedrohung

Mimecast’s State of Email Security Report shows ransomware attacks aren’t slowing down. Don’t be lulled by crypto-mining (or cryptojacking) alarmists into thinking that crypto-mining is replacing ransomware as a major new security …

Lesen Sie mehr dazu
Archiving, Archive and Data Protection

So kontrollieren Finanzunternehmen ihre Compliance-Kosten

Is your firm ready to face today's business and regulatory needs? Financial services firms face some of the world’s toughest regulatory pressures. And yet, most compliance programs have not scaled with the needs of the business or evolving reg…

Lesen Sie mehr dazu
Security, Email Security

Verhindern, nicht korrigieren: Drei Anforderungen an die Cybersicherheit

It’s never a bad time to pause and reflect on the vision for your IT security strategy. Is your IT security strategy based on “protecting your information assets from malicious code and cyber terrorists” or is it “preventing…

Lesen Sie mehr dazu
Security, Security Awareness Training

Ein steigender Trend: Cyber-Awareness-Schulungen in modernen Unternehmen

Adoption is rising, but is it happening fast enough? Here’s a stark reality: no matter how good your employees are at their jobs they still usually pose your biggest security risk. Human error ranks even higher for cyber risk than software fla…

Lesen Sie mehr dazu
Security, Email Security

Wie viele IT-Sicherheitstools braucht man eigentlich?

How many IT Security tools are you currently using to keep your IT environment secure? Odds are, it’s too many. There’s a big, big problem taking hold in the IT world today: IT/security teams are constantly expanding tooling and architec…

Lesen Sie mehr dazu
Security, Email Security

Unzureichende Cybersicherheitsmaßnahmen

Good enough security isn't good enough. Just checking the cybersecurity box with a few well know measures is not enough with today’s extremely sophisticated cybercriminals and even Ransomware as a Service offerings. It is the equivalent of an …

Lesen Sie mehr dazu
Security, Email Security

Echte Beispiele für Bedrohungen, die von E-Mail-Sicherheitssystemen übersehen wurden

A new view of the Mimecast Email Security Risk Assessment. With this blog I am happy to bring you the 9th consecutive quarterly release of our Mimecast Email Security Risk Assessment (ESRA) aggregate report, also with its associated funnel infograph…

Lesen Sie mehr dazu
Security, Email Security

Verdeckte dateifreie Malware: Die neuen Toolkits der Cyberhacker näher betrachtet

The latest from Mimecast Research Labs includes a malware technique never observed previously. Introduction Fileless malware has become an increasingly popular technique among cyberattackers because it reduces the defender’s ability to detect …

Lesen Sie mehr dazu