Security, Threat Intelligence Hub
Exploit Using Microsoft Excel Power…
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
DMARC can help protect brands from email domain spoofing. The problem is that not enough o… Read More >
DMARC can help protect brands from email domain spoofing. The problem is that not enough organizations are enforcing on DMARC yet. Key Points: The Cutwail botnet continues to be very active and often spoofs the brands of well-known organizations via email as part of its attacks. Though many well-kn… Read More >
Cybersecurity awareness traini… Read More >
Cybersecurity awareness training is key to security and resilience as more employees shop at home on corporate-issued de… Read More >
Mimecast’s now completed DMARC project highlights examples of attacks that were stop… Read More >
Mimecast’s now completed DMARC project highlights examples of attacks that were stopped using a combination of DMARC, for the email portion of the attack, and Mimecast’s Brand Exploit Protect for the malicious website detection and takedown. In my first blog on Mimecast’s internal … Read More >
Cybercriminals took advantage … Read More >
Cybercriminals took advantage of this year’s Amazon Prime Day to rev up credential harvesting, phishing attacks an… Read More >
Marketers' brand safety strategies should expand to embrace online brand impersonation in … Read More >
Marketers' brand safety strategies should expand to embrace online brand impersonation in collaboration with corporate cybersecurity teams. Key Points: Online brand impersonation is rampant, and cybercriminals regularly trick brand-loyal customers into falling for scams, revealing sensitive informa… Read More >
Search-ad phishing is yet anot… Read More >
Search-ad phishing is yet another cybercriminal activity that threatens brand safety – yet many marketers are stil… Read More >
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Since the dawn of social engineering, at…
Read More >
Since the dawn of social engineering, attack methodology has… Read More >
With Cybersecurity Awareness Month here,…
Read More >
With Cybersecurity Awareness Month here, we’re ready t… Read More >
Get posts like this delivered to…
Read More >
Get posts like this delivered to your inbox. Subscri… Read More >
Emerging standard specification ties brand logos to legitimate domains. It could increase trust in email and help people avoid phishing scams. Key Points: BIMI is an emerging email specification that appears to be making progress, with Google recent…
Since the rise of digital marketing, criminal hackers have infringed a large and diverse number of brands’ copyrights, trademarks and IP, creating a skyrocketing need for a culture of brand protection. Editor's note: This is the first in a seri…
A DMARC project goes well beyond just DNS administration; team structure and proper owned domain discovery, categorization, and prioritization will ensure a smooth journey to p=Reject. In my first blog on Mimecast’s internal DMARC project, I la…
Credential theft and revenue loss are cybercriminals’ goals when it comes to online brand spoofing, but a side effect is erosion of customer trust. Key Points: Mimecast discovered a spoofed site for Check Point Software Technologies, a c…
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Since the dawn of social engineering, at…
Read More >
Since the dawn of social engineering, attack methodology has… Read More >
With Cybersecurity Awareness Month here,…
Read More >
With Cybersecurity Awareness Month here, we’re ready t… Read More >
Get posts like this delivered to…
Read More >
Get posts like this delivered to your inbox. Subscri… Read More >