Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Threat Intel

, ,

AI, Infostealers, and Fresh Compromised Credentials

The aggregate lists of credentials extracted from infostealer logs, often referred to as “ULP” lists, remain in extremely high demand.

Read More

, , ,

Enhancing AD Security Against Password Spraying Attacks

Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls.

Read More

, ,

The Past Month in Stolen Data

Infostealers still take the top spot as the most prominent source for newly compromised credentials (and potentially other PII as well).

Read More

, , , ,

Updates on the Compromised Credential Landscape

Infostealer malware has led to an increase in credential compromise with threat actors exploiting password managers and targeting RMM tools.

Read More

, ,

Understanding the Dark Web: A Hidden Realm

Understand the Dark Web's complex character. The practical implications for cybersecurity and the importance of using this intelligence.

Read More

, , ,

Enzoic Dark Web Data Integration with ITDR Solutions

For ITDR solutions, addressing compromised credentials head-on is crucial to protecting end users' environments.

Read More

, ,

Google Threat Horizon Analysis

The Google Threat Horizons report found that cloud computing services are facing increasing threats of compromise and abuse.

Read More

, ,

The Heritage Foundation Hacked, User Should Reset Passwords

The Heritage Foundation, which authored a controversial policy roadmap called project2025, has been hacked. The group that hacked it, SiegedSec, has now disbanded.

Read More

, , , ,

Enhancing PAM Solutions with Enzoic

Get advanced integration of Dark Web intelligence and compromised credential data into PAM solutions to enhance security measures.

Read More