Security, Threat Intelligence Hub

Exploit met behulp van Microsoft Excel Power Query voor externe DDE-uitvoering ontdekt

Mimecast Threat Center discovered a weakness in the Microsoft Excel tool that allows embedding malicious payloads remotely. Summary (Editor’s note: The Mimecast Threat Center team would like to acknowledge the contributions of team member Doro…

Meer informatie
Security, Email Security

Ransomware raakt een toeleverancier van vliegtuigonderdelen

High-profile attacks highlight the need for advanced protection for all. It’s been a bad month for big ransomware attacks globally, and now another huge one has crippled a manufacturer in one of the world’s most critical industries. As r…

Meer informatie
Security, Email Security

Wat is de nettowaarde van uw cyberbeveiliging?

Calculating your cybersecurity net worth doesn't have to be complex.  Every public and private company maintains a set of financial documents to keep track of their assets and liabilities in order to determine their net worth. These reports inc…

Meer informatie
Security, Email Security

Uit het onderzoek blijkt: Ransomware staat voor de meeste organisaties nog steeds aan de top van de dreigingslijst

Mimecast’s State of Email Security Report shows ransomware attacks aren’t slowing down. Don’t be lulled by crypto-mining (or cryptojacking) alarmists into thinking that crypto-mining is replacing ransomware as a major new security …

Meer informatie
Archiving, Archive and Data Protection

Hoe financiële ondernemingen de kosten voor naleving bepalen

Is your firm ready to face today's business and regulatory needs? Financial services firms face some of the world’s toughest regulatory pressures. And yet, most compliance programs have not scaled with the needs of the business or evolving reg…

Meer informatie
Security, Email Security

Voorkomen, niet verhelpen: drie vereisten voor cyberbeveiliging

It’s never a bad time to pause and reflect on the vision for your IT security strategy. Is your IT security strategy based on “protecting your information assets from malicious code and cyber terrorists” or is it “preventing…

Meer informatie
Security, Security Awareness Training

De opkomst van cyberbewustzijnstrainingen voor hedendaagse ondernemingen

Adoption is rising, but is it happening fast enough? Here’s a stark reality: no matter how good your employees are at their jobs they still usually pose your biggest security risk. Human error ranks even higher for cyber risk than software fla…

Meer informatie
Security, Email Security

Hoeveel IT-beveiligingstools heeft u nodig?

How many IT Security tools are you currently using to keep your IT environment secure? Odds are, it’s too many. There’s a big, big problem taking hold in the IT world today: IT/security teams are constantly expanding tooling and architec…

Meer informatie
Security, Email Security

Ontoereikende maatregelen op het gebied van cyberveiligheid

Good enough security isn't good enough. Just checking the cybersecurity box with a few well know measures is not enough with today’s extremely sophisticated cybercriminals and even Ransomware as a Service offerings. It is the equivalent of an …

Meer informatie
Security, Email Security

Echte voorbeelden van dreigingen gemist door allerhande e-mailbeveiligingssystemen

A new view of the Mimecast Email Security Risk Assessment. With this blog I am happy to bring you the 9th consecutive quarterly release of our Mimecast Email Security Risk Assessment (ESRA) aggregate report, also with its associated funnel infograph…

Meer informatie
Security, Email Security

Nader bekeken: Verdoezelde bestandsloze malware in de toolkits van cyberaanvallers

The latest from Mimecast Research Labs includes a malware technique never observed previously. Introduction Fileless malware has become an increasingly popular technique among cyberattackers because it reduces the defender’s ability to detect …

Meer informatie