RESOURCES
Research, views, and insights on cybersecurity, account takeover, fraud, and more
Account Takeover, Password Security, Threat Intel
The consequences of ATO can range from personal account hijacking to more severe impacts like corporate email breaches.
Infostealer infrastructure disruption as Dutch authorities claim to have shut down some threat actors operating instances.
Account Takeover, Cybersecurity, Threat Intel
The aggregate lists of credentials extracted from infostealer logs, often referred to as “ULP” lists, remain in extremely high demand.
Active Directory, Credential Screening, Cybersecurity, Threat Intel
Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls.
Cybersecurity, Data Breaches, Threat Intel
Infostealers still take the top spot as the most prominent source for newly compromised credentials (and potentially other PII as well).
Account Takeover, Active Directory, Cybersecurity, Data Breaches, Threat Intel
Infostealer malware has led to an increase in credential compromise with threat actors exploiting password managers and targeting RMM tools.
Cybersecurity, Data Breaches, Threat Intel
Understand the Dark Web's complex character. The practical implications for cybersecurity and the importance of using this intelligence.
Credential Screening, Cybersecurity, Data Breaches, Threat Intel
For ITDR solutions, addressing compromised credentials head-on is crucial to protecting end users' environments.
Cybersecurity, Data Breaches, Threat Intel
The Google Threat Horizons report found that cloud computing services are facing increasing threats of compromise and abuse.
No Spam. Only sweet content and updates on our products and solutions.