Threat Intelligence Hub

Image of threat map for mobile devices

Popular Posts

Threat Intelligence Articles

Email Security, Threat Intelligence Hub

Beyond Patching: Five Ways to Help Mitigate the Risk of Hafnium or Other Microsoft Exchange Server Zero-Day attacks

To best fortify against zero-day attacks, organizations' cyber resilience strategies must expand far beyond patching vulnerabilities. Zero-day attacks, like the recent one Microsoft disclosed was perpetuated by the Hafnium group, present a heightened…

Read More >

Email Security, Threat Intelligence Hub

Detecting and Preventing a TA551 Email Spam Strike

TA551 email spam attacks are devious and very difficult to detect. Only in-depth analysis of the emails plus enhanced AV software has been able to defeat them. Key Points: Like a chameleon, a TA551 attack blends in with its surroundings, making it e…

Read More >

Brand Protection, Threat Intelligence Hub

How to Slam a Door on the Cutwail Botnet: Enforce DMARC

DMARC can help protect brands from email domain spoofing. The problem is that not enough organizations are enforcing on DMARC yet. Key Points: The Cutwail botnet continues to be very active and often spoofs the brands of well-known organizations via…

Read More >

Web Security, Threat Intelligence Hub

FireEye Attack Raises the Bar on Cyber Resilience for Everyone

Threat actors steal ‘white hat’ tools, but FireEye publishes countermeasures to help the cybersecurity community thwart their use. The cyberattack on FireEye, revealed earlier this week, elevates cyber risk for all organizations. But than…

Read More >

Email Security, Threat Intelligence Hub

Anatomy of a Sustained BEC Attack on Microsoft 365 Users

Cyberattackers lurked in victims’ Microsoft 365 email accounts for months, first to divert $15 million, and then to prevent detection of their email compromise. Key Points: A recent global business email compromise campaign, now under investig…

Read More >

categories

Read More >

View More

Mimecast Discoveries