RESOURCES
Research, views, and insights on cybersecurity, account takeover, fraud, and more
Cybersecurity, Data Breaches, Threat Intel
With every new year bringing new technologies, expanding attack surfaces, and legions of salivating threat actors.
Cybersecurity, Data Breaches, Threat Intel
1 in 10 Fortune 500 employees had their credentials exposed. Each compromised account was found an average of 5.7 times.
Account Takeover, Threat Intel
The battle against ATO attacks is one of speed, scale, and sophistication and defenders are dealing with an overwhelming influx of data.
Account Takeover, Active Directory, Password Security, Threat Intel
Whether you're a CISO or a security professional this Q&A is packed with credential security insights you can implement today.
Credential Screening, Cybersecurity, Data Breaches, Threat Intel
The cybersecurity landscape over the past 12 months shows that It’s been a banner year of compromised credential data collection.
Account Takeover, Password Security, Threat Intel
The consequences of ATO can range from personal account hijacking to more severe impacts like corporate email breaches.
Infostealer infrastructure disruption as Dutch authorities claim to have shut down some threat actors operating instances.
Account Takeover, Cybersecurity, Threat Intel
The aggregate lists of credentials extracted from infostealer logs, often referred to as “ULP” lists, remain in extremely high demand.
Active Directory, Credential Screening, Cybersecurity, Threat Intel
Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls.
No Spam. Only sweet content and updates on our products and solutions.