Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Threat Intel

, ,

Disorder in the Court: Unintended Consequences of ATO

The consequences of ATO can range from personal account hijacking to more severe impacts like corporate email breaches.

Read More

,

Police Blotter

Infostealer infrastructure disruption as Dutch authorities claim to have shut down some threat actors operating instances.

Read More

, ,

AI, Infostealers, and Fresh Compromised Credentials

The aggregate lists of credentials extracted from infostealer logs, often referred to as “ULP” lists, remain in extremely high demand.

Read More

, , ,

Enhancing AD Security Against Password Spraying Attacks

Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls.

Read More

, ,

The Past Month in Stolen Data

Infostealers still take the top spot as the most prominent source for newly compromised credentials (and potentially other PII as well).

Read More

, , , ,

Updates on the Compromised Credential Landscape

Infostealer malware has led to an increase in credential compromise with threat actors exploiting password managers and targeting RMM tools.

Read More

, ,

Understanding the Dark Web: A Hidden Realm

Understand the Dark Web's complex character. The practical implications for cybersecurity and the importance of using this intelligence.

Read More

, , ,

Enzoic Dark Web Data Integration with ITDR Solutions

For ITDR solutions, addressing compromised credentials head-on is crucial to protecting end users' environments.

Read More

, ,

Google Threat Horizon Analysis

The Google Threat Horizons report found that cloud computing services are facing increasing threats of compromise and abuse.

Read More