Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

How Weak Passwords Lead to Ransomware Attacks

Prevent ransomware attacks by building layers of defense into your cybersecurity strategy to mitigate the fallout of an infiltration.

Read More

Viewing All Blogs

, , ,

BEC Attack Prevention

Once attackers have valid credentials, they gain unauthorized access to email accounts, making it much easier to carry out a BEC attack.

Read More

, , ,

Enhancing AD Security Against Password Spraying Attacks

Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls.

Read More

, ,

The Past Month in Stolen Data

Infostealers still take the top spot as the most prominent source for newly compromised credentials (and potentially other PII as well).

Read More

, , , ,

Updates on the Compromised Credential Landscape

Infostealer malware has led to an increase in credential compromise with threat actors exploiting password managers and targeting RMM tools.

Read More

, , ,

Microsoft Entra ID Password Protection in Hybrid Environments

Can Entra ID continually defend against exposed passwords in new data breaches as businesses operate across a hybrid environment?

Read More

, , ,

Microsoft Entra ID Password Protection: Overcoming the Limitations

Microsoft Entra ID is one of the tools many organizations rely on to protect their passwords, but is it enough? Understand the limitations.

Read More

, ,

Public Sector Compliance: Passwords and Credentials Matter

Helping government agencies and organizations operating in the public sector navigate password and credential security.

Read More

,

Betting, Gambling, and Sports Betting Sites: The Costs of ATO

The most prevalent and damaging attack plaguing the online betting and gambling industry is fraud stemming from account takeover.

Read More