Where Mimecast customers, partners, and employees come together to discuss our products and services. Ask the Mimecast community a question, or search the forums to see if your question has already been asked and answered!
You are currently in a limited view of the community, but there's so much more to discover! Need some support? Have a question to ask?
Stay ahead of cyber threats! Explore Mimecast's product and threat intelligence blogs for insights and updates. Read our blogs and stay informed.
This discussion has been moved.
Good day Community - I am excited to announce a new addition: community blogs! In addition to the hyperlink above, you may access them in the following ways: Hover over the Knowledge tab within the top menu bar and select Blogs. Choose Blogs from the Quick Links widget on the right margin of the home page. I hope you find…
Have you read the Threat Intelligence Notifications published on the Mimecast Threat Intelligence Hub? I am asking you to share your experience to help us make them as useful as possible for everyone: Please share at least one example of a specific TIN article that prompted you/your team to take action after reading it.…
Managing security integrations shouldn't be complex. Yet many organizations tell us they're unable to easily navigate multiple interfaces and determine integration statuses within Mimecast. We heard you, and today we're excited to introduce the Integration Hub — our new unified section within the AdCon that simplifies how…
Key Points What you'll learn in this notification Campaign using Scalable Vector Graphics (SVG) with JavaScript redirects Users are redirected to credential harvesting pages or download malware Rikesh Vekaria, Marcin Ulikowski, and the Mimecast threat researchers have recently identified several campaigns utilising…
Key Points What you'll learn in this notification Campaign impersonating Mimecast and other brands Predominately targeting real estate industries in the US Uses redirects through various email security rewritten links to a credential harvesting page "Rikesh Vekaria and the Mimecast threat researchers have recently…
Key Points What you'll learn in this notification Threat operations are implementing sophisticated anti-analysis measures within CAPTCHA pages to evade detection and prevent investigation. The malicious pages actively detect security tools and redirect to innocuous destinations when identified, avoiding scrutiny by…
Key Points What you'll learn in this notification Targeting hospitality sector predominately in the UK Operation employs the “Clickfix” technique to enhance its effectiveness Malware associated with these campaigns has been identified as LummaC, a popular infostealer Mimecast Threat Researchers have observed a malware…
Email and collaboration tools are indispensable for modern business communication, enabling seamless workflows across teams, partners, and customers. However, these tools also serve as the primary entry points for cybercriminals. From phishing and business email compromise (BEC) to malware and brand impersonation,…
In today’s digital-first world, organizations face a growing challenge: insider risks. While external threats like phishing and ransomware dominate headlines, insider risks—whether accidental or malicious—are just as dangerous. Employees and contractors can unintentionally or intentionally misuse sensitive data, leading to…
Meet with our team and discover how Mimecast’s Human Risk Management Platform can help you protect collaboration, empower your users, and detect insider risk. Don’t miss this exclusive opportunity – space is limited! Additional Opportunities to connect with us: Come visit us at South Hall Booth #654 and join our theater…
Join Mimecast at RSA Conference to learn more about our Human Risk Management Platform and see live demonstrations from one of our Mimecast experts. Come visit us at South Hall Booth #654. We look forward to seeing you in San Francisco!
Black Hat USA returns to the Mandalay Bay Convention Center in Las Vegas with a 6-day program. The event will open with four days of specialized cybersecurity Trainings (August 2-5), with courses for all skill levels. Also taking place during Black Hat USA is Summit Day on Tuesday, August 5, followed by the two-day main…