Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Threat Intel

, ,

Early Trends in 2025

With every new year bringing new technologies, expanding attack surfaces, and legions of salivating threat actors.

Read More

, ,

Fortune 500 Employees’ Credentials Under Siege

1 in 10 Fortune 500 employees had their credentials exposed. Each compromised account was found an average of 5.7 times.

Read More

,

ATO Attacks from a Threat Intel Perspective

The battle against ATO attacks is one of speed, scale, and sophistication and defenders are dealing with an overwhelming influx of data.

Read More

, , ,

Rethinking Credential Security

Whether you're a CISO or a security professional this Q&A is packed with credential security insights you can implement today.

Read More

, , ,

Reflecting on a Year of Compromised Data

The cybersecurity landscape over the past 12 months shows that It’s been a banner year of compromised credential data collection.

Read More

, ,

Disorder in the Court: Unintended Consequences of ATO

The consequences of ATO can range from personal account hijacking to more severe impacts like corporate email breaches.

Read More

,

Police Blotter

Infostealer infrastructure disruption as Dutch authorities claim to have shut down some threat actors operating instances.

Read More

, ,

AI, Infostealers, and Fresh Compromised Credentials

The aggregate lists of credentials extracted from infostealer logs, often referred to as “ULP” lists, remain in extremely high demand.

Read More

, , ,

Enhancing Active Directory Security Against Password Spraying Attacks

Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls.

Read More