The certificate used to authenticate Mimecast’s Sync and Recover, Continuity Monitor and Internal Email Protect (IEP) products to Microsoft 365 has been compromised by a sophisticated threat actor. A ...
Add Yahoo as a preferred source to see more of our stories on Google. When you buy through links on our articles, Future and its syndication partners may earn a commission. This is according to ...
LEXINGTON, Mass., Aug. 17, 2020 (GLOBE NEWSWIRE) -- Mimecast Limited (NASDAQ: MIME), a leading email security and cyber resilience company, today announced the availability of Mimecast ® Email ...
Publicly-traded cybersecurity company Mimecast announced the acquisition on Tuesday of Bethesda, Md.–based startup Ataata. Founded in 2016, Ataata seeks to help companies raise awareness about ...
LEXINGTON, Mass., Sept. 01, 2020 (GLOBE NEWSWIRE) -- Mimecast (NASDAQ: MIME) today announced it has received certification of its application with ServiceNow, available now in the ServiceNow Store.
A sophisticated threat actor has hijacked email security connections to spy on targets. A Mimecast-issued certificate used to authenticate some of the company’s products to Microsoft 365 Exchange Web ...
To continue reading this content, please enable JavaScript in your browser settings and refresh this page. Preview this article 1 min The SEC charges are related to ...
The technology of early stage cybersecurity startup Segasec is engineered to actively monitor, manage, block and take down phishing scams or impersonation attempts on the web. Mimecast has purchased ...
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. The email and data security company said the compromised certificate is used to authenticate its ...
State and local government agencies are solidly in the crosshairs of cybercriminals. And when it comes to today’s top threats, such as ransomware, the fact that many state and local agencies don’t ...
Imagine that the content of an email could be changed by the sender after it had been received and read by the recipient. In addition, imagine that the changes could be made from a remote site without ...