Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Active Directory

, , ,

BEC Attack Prevention

Once attackers have valid credentials, they gain unauthorized access to email accounts, making it much easier to carry out a BEC attack.

Read More

, , ,

Enhancing AD Security Against Password Spraying Attacks

Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls.

Read More

, , , ,

Updates on the Compromised Credential Landscape

Infostealer malware has led to an increase in credential compromise with threat actors exploiting password managers and targeting RMM tools.

Read More

, , ,

Microsoft Entra ID Password Protection in Hybrid Environments

Can Entra ID continually defend against exposed passwords in new data breaches as businesses operate across a hybrid environment?

Read More

, , ,

Microsoft Entra ID Password Protection: Overcoming the Limitations

Microsoft Entra ID is one of the tools many organizations rely on to protect their passwords, but is it enough? Understand the limitations.

Read More

, , , ,

Insights from IBM’s 2024 Cost of a Data Breach Report

The cost of a data breach has reached alarming levels. The global average spiked to $4.88 million, a 10% increase over the previous year.

Read More

, , ,

Enzoic for Active Directory 3.5: Elevating Visibility Into Your Environment

Version 3.5 of Enzoic for Active Directory aims to provide greater visibility and control over your environment.

Read More

, ,

NYDFS Cybersecurity Regulation: Automated Blocking of Commonly Used Passwords

NYDFS introduced its 2nd amended Cybersecurity Regulation. One requirement is the automated blocking of commonly used passwords.

Read More

, , ,

Understanding Penetration Testing

What is a penetration test? How can I ensure there are no compromises after a pentest? Here are some common FAQs and answers.

Read More