Threat Intelligence Hub
Mimecast threat research delivers analysis of threat activity, statistics revealing attack trends, and recommendations for small businesses and large enterprises to protect their employees and mitigate the impact of risky users.
Your Threat Landscape
Discover your personalized threat landscape July to December 2024
Get your threat landscape results delivered to directly your inbox.
Congratulations!
Your personalized threat landscape results are ready and on their way to your inbox. Stay ahead of potential risks by exploring our platform and discovering how our solutions can help safeguard your organization. Visit our platform page to learn more!
Cloud service abuse
Cybercriminals increasingly use legitimate online services (LOTS strategy) to bypass security defenses. This visualization maps relationships between original URLs, malicious content types, and ultimate destinations, revealing how attackers obfuscate their intent through trusted business platforms. Understanding these connections is essential for developing effective cybersecurity measures that can identify threats hiding within legitimate services.
Top targeted industries by threats per user
Different industries face distinct attack methodologies, creating unique threat profiles for each sector. Our analysis reveals that attackers strategically vary their techniques based on industry characteristics, targeting specific vulnerabilities and data types. While every industry encounters significant volumes of spam and threats using low-reputation infrastructure, the specific attack vectors and techniques show marked variation across sectors and highlights the sophisticated nature of modern email threats. Understanding these distinct threat profiles allows organizations to implement more effective security measures rather than generic protections that may leave sector-specific vulnerabilities exposed.
Threats per user by attack type
Detection’s are categorized by interception stage: Spam: Mass emails from untrusted domains containing widely encountered content. Suspicious Messages: Potentially malicious communications lacking confirmed harmful content but showing risk indicators. Unwanted: User-blocked messages bypassing automated filters. Phishing: Deceptive content designed to extract sensitive information through fraudulent links, business email compromise, impersonation, or fake login pages. Malware: Messages containing malicious attachments or links leading to harmful code. Understanding these classifications helps organizations better defend against increasingly sophisticated email threats
Top vulnerabilities over time
Email-borne vulnerability exploits concentration patterns examining the top 10 detected vulnerabilities—whether delivered directly via email or through embedded links. Our analysis also highlights significant divergence between EPSS scores and Common Vulnerability Scoring System (CVSS) ratings. This disconnect demonstrates how severity ratings may not accurately predict real-world exploitation likelihood, requiring security teams to consider both metrics.
H2 2024 Global Threat Intelligence Snapshot
Humans continue to play a primary role in most breaches, whether it's falling victim to social engineering attacks or brand impersonation scams.
Advanced attack infrastructure
Attackers are Living Off Trusted Services (LOTS), using Microsoft's, Google's, and Evernote's cloud services to host payloads and landing pages.
Chaos via world events
Business, political, and cybersecurity experts have increasingly warned that geopolitical tensions and cybersecurity risks are linked, as cybercriminals use them to sow chaos.
AI enables cybercrime
The spread of AI chat bots allows even would-be cybercriminals to gain the skills necessary for hacking.
Threat Intelligence Notifications
Read the latest threat intelligence notifications and gain insight to better protect your organization.
Mimecast regional threat
intelligence webinars
Join us monthly as our regional experts unpack the latest cybersecurity insights that empowers you and your organization with the knowledge to navigate the landscape, learn from the field, and boost your security strategy.
Sign up for your
regional series
Join us monthly as our regional experts unpack the latest cybersecurity insights that empowers you and your organization with the knowledge to navigate the landscape, learn from the field, and boost your security strategy.
Watch on-demand
Missed any episodes? Watch every episode on demand to stay up to date with the latest news, trends, and threat intelligence.
RiskRadar Species
Detect, Analyze, Action