Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

, , , ,

Enzoic’s Partner Program to Help Combat Dark Web Exposures

Enzoic's Global Partner Program helps organizations strengthen their security posture and addresses numerous security vulnerabilities.

Read More

, ,

Snowflake Breach

Snowflakes has become the latest corporate victim in a cyberattack but how it is playing out is a little different than many breaches.

Read More

,

Enzoic Appoints Kristen Ranta Haikal Wilson CEO

Enzoic, a leader in cybersecurity credential screening and Dark Web intelligence, announces Kristen Ranta Haikal Wilson as its new CEO.

Read More

, ,

The Lockbit Ransomware Group

The homepage of the Lockbit group began displaying a message from federal agencies claiming they had seized the domain.

Read More

, , , ,

Unlock Advanced Threat Correlation

Visit the ThreatQ marketplace and sign up for the free trial of the Enzoic and ThreatQ integration. Experience integrated cybersecurity.

Read More

, , ,

Does the Mother Of All Breaches Matter?

The MOABĀ  includes records from thousands of well-organized and reindexed leaks, breaches, and privately sold databases.

Read More

, ,

NYDFS Cybersecurity Regulation: Automated Blocking of Commonly Used Passwords

NYDFS introduced its 2nd amended Cybersecurity Regulation. One requirement is the automated blocking of commonly used passwords.

Read More

, , ,

Understanding Penetration Testing

What is a penetration test? How can I ensure there are no compromises after a pentest? Here are some common FAQs and answers.

Read More

, , ,

I Failed a Pentest: What do I Do?

Steps you should take after failing a pentest and focusing on addressing the vulnerabilities found and ensuring there are no compromises.

Read More