Threat Intelligence Hub

Image of threat map for mobile devices

Popular Posts

Threat Intelligence Articles

Threat Intelligence Hub

Episode #5, Season 2 of Phishy Business: Teenagers and cybercrime- the draw of malice and money?

In the episode we speak to Floor Jansen, team leader of the offender prevention squad of the Dutch police, and British offender prevention expert Gregory Francis about young cybercrime offenders. We discuss their sometimes surprising motivations, wh…

Read More >

Threat Intelligence Hub

How Antispam Software and Ransomware Protection are Connected

Research from Mimecast Threat Center reveals a malware campaign delivered via sideloading, a new technique enabled by Windows 10, known to result in ransomware attacks.   Key Points: A threat actor known for spreading malware such as Trickbot a…

Read More >

Security Awareness Training, Threat Intelligence Hub

Countering Synthetic Media Attacks with Security Policy

Scams that digitally impersonate people’s voices and likenesses are poised to become the next wave of cyber risk. How should employees train up? Key Points: Deepfakes are infiltrating the business world. Cyber scammers can use advanced technol…

Read More >

Threat Intelligence Hub

Malware Analysis: How to Protect Against Malware

By studying malware samples, organizations can learn how to better detect, contain and respond to malicious software before it can do any harm. Key Points: Malware analysis helps companies understand and proactively protect themselves against attack…

Read More >

Threat Intelligence Hub

Chaos Creates Even More Chaos: The Potential Post-Pandemic Cybersecurity Environment

A layered cybersecurity strategy best protects against rising threats due to uncertainties created by remote and hybrid working. Key Points: Threat actors will exploit the chaos and uncertainty post-pandemic just as they have during the pandemic: by…

Read More >

categories

Read More >

View More

Mimecast Discoveries