Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

, , ,

BEC Attack Prevention

Once attackers have valid credentials, they gain unauthorized access to email accounts, making it much easier to carry out a BEC attack.

Read More

, , ,

Enhancing AD Security Against Password Spraying Attacks

Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls.

Read More

, ,

The Past Month in Stolen Data

Infostealers still take the top spot as the most prominent source for newly compromised credentials (and potentially other PII as well).

Read More

, , , ,

Updates on the Compromised Credential Landscape

Infostealer malware has led to an increase in credential compromise with threat actors exploiting password managers and targeting RMM tools.

Read More

, , ,

Microsoft Entra ID Password Protection in Hybrid Environments

Can Entra ID continually defend against exposed passwords in new data breaches as businesses operate across a hybrid environment?

Read More

, , ,

Microsoft Entra ID Password Protection: Overcoming the Limitations

Microsoft Entra ID is one of the tools many organizations rely on to protect their passwords, but is it enough? Understand the limitations.

Read More

, ,

Public Sector Compliance: Passwords and Credentials Matter

Helping government agencies and organizations operating in the public sector navigate password and credential security.

Read More

,

Betting, Gambling, and Sports Betting Sites: The Costs of ATO

The most prevalent and damaging attack plaguing the online betting and gambling industry is fraud stemming from account takeover.

Read More

,

Harmonizing Security and Usability to Tackle Account Takeover

ATO has become a significant threat. Read how to balance strong security measures with a seamless user experience.

Read More