Threat Intelligence Hub
The Mimecast Threat Intelligence Report
The Mimecast Threat Intelligence Report capitalizes on research conducted by the Mimecast Threat Center that provides analysis of 67 billion rejected emails. The research reinforces a previously observed trend: malware-centric campaigns are becoming increasingly sophisticated and complex, often using different pieces and types of malware in different phases of the attack. In addition, the resear...
Latest Threat Intelligence Blogs
What to Consider Before Choosing the Right SIEM Tool
Security Information and Event Management (SIEM) tools play an integral part in the Security Operations Center (SOC) systems of many organizations, functioning at its most basic level to collect log data and collate it into a single, centralized platform. These SIEM tools enable advanced cyberthreat detection, highlighting potential threats and vulnerabilities, real-time event monitoring, and secu...
7 Ways to Protect Against Credential Theft
Most data breaches don’t actually require a clever hack or exploit — just a valid username and password in the wrong hands. Data breaches resulting from credential theft (the most common type) cost companies an average of $4.5 million, according to according to a 2022 report.  And they were some of the hardest to neutralize, taking companies an average of eight months to identify and 12 wee...
Twitter Publicity Leads to a Wave of Phishing
Phishing campaigns have become an inescapable part of online life. Hardly a day goes by without a new version or variation landing in inboxes. So, it shouldn’t come as any surprise that opportunistic cybercriminals took aim at people seeking an $8 blue check on Twitter as soon as the new program was announced. The subscription program — later abandoned amid a highly publicized series of changes m...
Explore More Threat Intelligence Resources
Unfortunately we don't have any results matching your criteria, but you can try changing the selected filters above.
Find out how we can help you
tackle online threats
Get the latest threat intelligence information and resources from our Threat Center researchers who provide technical analysis of cyberattack campaigns, evolving threat landscapes as well as recommendations to help guide your cybersecurity practice.