RESOURCES
Research, views, and insights on cybersecurity, account takeover, fraud, and more
Active Directory, Credential Screening, Cybersecurity, Data Breaches
Once attackers have valid credentials, they gain unauthorized access to email accounts, making it much easier to carry out a BEC attack.
Active Directory, Credential Screening, Cybersecurity, Threat Intel
Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls.
Cybersecurity, Data Breaches, Threat Intel
Infostealers still take the top spot as the most prominent source for newly compromised credentials (and potentially other PII as well).
Account Takeover, Active Directory, Cybersecurity, Data Breaches, Threat Intel
Infostealer malware has led to an increase in credential compromise with threat actors exploiting password managers and targeting RMM tools.
Active Directory, Continuous Password Protection, Data Breaches, Entra ID / Azure AD
Can Entra ID continually defend against exposed passwords in new data breaches as businesses operate across a hybrid environment?
Active Directory, Continuous Password Protection, Data Breaches, Entra ID / Azure AD
Microsoft Entra ID is one of the tools many organizations rely on to protect their passwords, but is it enough? Understand the limitations.
Data Breaches, Password Security, Regulation and Compliance
Helping government agencies and organizations operating in the public sector navigate password and credential security.
Account Takeover, Data Breaches
The most prevalent and damaging attack plaguing the online betting and gambling industry is fraud stemming from account takeover.
Account Takeover, Data Breaches
ATO has become a significant threat. Read how to balance strong security measures with a seamless user experience.
No Spam. Only sweet content and updates on our products and solutions.