Threat Intelligence Hub
Mimecast threat research delivers analysis of threat activity, statistics revealing attack trends, and recommendations for small businesses and large enterprises to protect their employees and mitigate the impact of risky users.
Your Threat Landscape
Discover your personalized threat landscape January to September 2025
Get your threat landscape results delivered to directly your inbox.
Congratulations!
Your personalized threat landscape results are ready and on their way to your inbox. Stay ahead of potential risks by exploring our platform and discovering how our solutions can help safeguard your organization. Visit our platform page to learn more!
Cloud service abuse
Cybercriminals increasingly use legitimate online services (LOTS strategy) to bypass security defenses. This visualization maps relationships between original URLs, malicious content types, and ultimate destinations, revealing how attackers obfuscate their intent through trusted business platforms. Understanding these connections is essential for developing effective cybersecurity measures that can identify threats hiding within legitimate services.
Top targeted industries by threats per user
Different industries face distinct attack methodologies, creating unique threat profiles for each sector. Our analysis reveals that attackers strategically vary their techniques based on industry characteristics, targeting specific vulnerabilities and data types. While every industry encounters significant volumes of spam and threats using low-reputation infrastructure, the specific attack vectors and techniques show marked variation across sectors and highlights the sophisticated nature of modern email threats. Understanding these distinct threat profiles allows organizations to implement more effective security measures rather than generic protections that may leave sector-specific vulnerabilities exposed.
Collaboration threats
Collaboration platform threats exhibit distinct detection patterns compared to traditional email environments, with attack types distributed differently across Microsoft Teams, SharePoint, and OneDrive. The distribution of threats reveals how closed collaboration environments create unique risk profiles. Understanding these platform-specific threat patterns enables organizations to implement security controls designed for persistent collaboration environments rather than relying solely on externally-focused defenses.
Top vulnerabilities over time
Email-borne vulnerability exploits concentration patterns examining the top 10 detected vulnerabilities—whether delivered directly via email or through embedded links. Our analysis also highlights significant divergence between EPSS scores and Common Vulnerability Scoring System (CVSS) ratings. This disconnect demonstrates how severity ratings may not accurately predict real-world exploitation likelihood, requiring security teams to consider both metrics.
BEC attacks
Business email compromise tactics are tracked by common techniques deployed over time, revealing how attackers prioritize different social engineering methods. This visualization categorizes BEC attempts by their core methodology with temporal patterns demonstrating tactical evolution. Understanding these technique distributions helps organizations tailor verification procedures and employee training to address the most prevalent BEC methodologies.
2025 Global Threat Intelligence Snapshot
Humans continue to play a primary role in most breaches, whether it's falling victim to social engineering attacks or brand impersonation scams.
Advanced attack infrastructure
Attackers are Living Off Trusted Services (LOTS), using Microsoft's, Google's, and Evernote's cloud services to host payloads and landing pages.
Chaos via world events
Business, political, and cybersecurity experts have increasingly warned that geopolitical tensions and cybersecurity risks are linked, as cybercriminals use them to sow chaos.
AI enables cybercrime
The spread of AI chat bots allows even would-be cybercriminals to gain the skills necessary for hacking.
Threat Intelligence Notifications
Read the latest threat intelligence notifications and gain insight to better protect your organization.
Keep your edge in threat intelligence
Join thousands of security professionals who rely on our curated alerts, expert analysis, and campaign IOCs to defend against the latest cyber threats.
Sign up successful
Thank you for signing up to receive updates for our threat intelligence notifications.
We will be in touch!
Mimecast regional threat
intelligence webinars
Join us monthly as our regional experts unpack the latest cybersecurity insights that empowers you and your organization with the knowledge to navigate the landscape, learn from the field, and boost your security strategy.
Sign up for your
regional series
Join us monthly as our regional experts unpack the latest cybersecurity insights that empowers you and your organization with the knowledge to navigate the landscape, learn from the field, and boost your security strategy.
Watch on-demand
Missed any episodes? Watch every episode on demand to stay up to date with the latest news, trends, and threat intelligence.
RiskRadar Species
Detect, Analyze, Action