RESOURCES
Research, views, and insights on cybersecurity, account takeover, fraud, and more
Cybersecurity, Regulation and Compliance
Following NIST password guidelines helps organizations secure better rates on their cyber liability insurance.
Account Takeover, Cybersecurity, MFA, Password Security
The Microsoft 2024 Digital Defense Report exposes a hard truth—old-school password attacks are prevalent and effective.
Infostealer infrastructure disruption as Dutch authorities claim to have shut down some threat actors operating instances.
Continuous Password Protection, Credential Screening, Cybersecurity, EdTech, GovTech
Enzoic has partnered with CIS CyberMarket to enhance cybersecurity offerings for public sector organizations.
Account Takeover, Cybersecurity, Threat Intel
The aggregate lists of credentials extracted from infostealer logs, often referred to as “ULP” lists, remain in extremely high demand.
Cybersecurity, Data Breaches, Regulation and Compliance
The PSR protections will help address the growing threat of APP scams, with the £85,000 refund limit giving relief for victims of scams.
Active Directory, Credential Screening, Cybersecurity, Data Breaches
Once attackers have valid credentials, they gain unauthorized access to email accounts, making it much easier to carry out a BEC attack.
Active Directory, Credential Screening, Cybersecurity, Threat Intel
Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls.
Cybersecurity, Data Breaches, Threat Intel
Infostealers still take the top spot as the most prominent source for newly compromised credentials (and potentially other PII as well).
No Spam. Only sweet content and updates on our products and solutions.