Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Cybersecurity

, ,

AI, Infostealers, and Fresh Compromised Credentials

The aggregate lists of credentials extracted from infostealer logs, often referred to as “ULP” lists, remain in extremely high demand.

Read More

, ,

The Newest PSR Protections

The PSR protections will help address the growing threat of APP scams, with the £85,000 refund limit giving relief for victims of scams.

Read More

, , ,

BEC Attack Prevention

Once attackers have valid credentials, they gain unauthorized access to email accounts, making it much easier to carry out a BEC attack.

Read More

, , ,

Enhancing AD Security Against Password Spraying Attacks

Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls.

Read More

, ,

The Past Month in Stolen Data

Infostealers still take the top spot as the most prominent source for newly compromised credentials (and potentially other PII as well).

Read More

, , , ,

Updates on the Compromised Credential Landscape

Infostealer malware has led to an increase in credential compromise with threat actors exploiting password managers and targeting RMM tools.

Read More

,

Black Hat USA 2024: Key Takeaways from the Premier Cybersecurity Event

Black Hat 2024 tackled global challenges, briefings that dived into the depths of emerging threats, and an undeniable focus on data breaches.

Read More

, ,

Understanding the Dark Web: A Hidden Realm

Understand the Dark Web's complex character. The practical implications for cybersecurity and the importance of using this intelligence.

Read More

, , ,

Enzoic Dark Web Data Integration with ITDR Solutions

For ITDR solutions, addressing compromised credentials head-on is crucial to protecting end users' environments.

Read More