Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Data Breaches

, ,

Google Threat Horizon Analysis

The Google Threat Horizons report found that cloud computing services are facing increasing threats of compromise and abuse.

Read More

, ,

How to Prevent Fraud in Banking: Foundational Strategies

Around the world, countries are rolling out stringent regulations aimed at improving consumer protection within the financial sector.

Read More

, ,

The Heritage Foundation Hacked, User Should Reset Passwords

The Heritage Foundation, which authored a controversial policy roadmap called project2025, has been hacked. The group that hacked it, SiegedSec, has now disbanded.

Read More

, , , ,

Enhancing PAM Solutions with Enzoic

Get advanced integration of Dark Web intelligence and compromised credential data into PAM solutions to enhance security measures.

Read More

, ,

RockYou2024

RockYou2024 password list boasts over 9.9 billion raw lines. This dictionary demonstrates the continued relevance of stolen user credentials.

Read More

, , , ,

Enzoic’s Partner Program to Help Combat Dark Web Exposures

Enzoic's Global Partner Program helps organizations strengthen their security posture and addresses numerous security vulnerabilities.

Read More

, ,

Snowflake Breach

Snowflakes has become the latest corporate victim in a cyberattack but how it is playing out is a little different than many breaches.

Read More

, ,

The Lockbit Ransomware Group

The homepage of the Lockbit group began displaying a message from federal agencies claiming they had seized the domain.

Read More

, , , ,

Unlock Advanced Threat Correlation

Visit the ThreatQ marketplace and sign up for the free trial of the Enzoic and ThreatQ integration. Experience integrated cybersecurity.

Read More