Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Threat Intel

, ,

Google Threat Horizon Analysis

The Google Threat Horizons report found that cloud computing services are facing increasing threats of compromise and abuse.

Read More

, ,

The Heritage Foundation Hacked, User Should Reset Passwords

The Heritage Foundation, which authored a controversial policy roadmap called project2025, has been hacked. The group that hacked it, SiegedSec, has now disbanded.

Read More

, , , ,

Enhancing PAM Solutions with Enzoic

Get advanced integration of Dark Web intelligence and compromised credential data into PAM solutions to enhance security measures.

Read More

, ,

RockYou2024

RockYou2024 password list boasts over 9.9 billion raw lines. This dictionary demonstrates the continued relevance of stolen user credentials.

Read More

, , , ,

Enzoic’s Partner Program to Help Combat Dark Web Exposures

Enzoic's Global Partner Program helps organizations strengthen their security posture and addresses numerous security vulnerabilities.

Read More

, ,

The Lockbit Ransomware Group

The homepage of the Lockbit group began displaying a message from federal agencies claiming they had seized the domain.

Read More

, , , ,

Unlock Advanced Threat Correlation

Visit the ThreatQ marketplace and sign up for the free trial of the Enzoic and ThreatQ integration. Experience integrated cybersecurity.

Read More

, , , ,

The Role of Threat Intelligence in Financial Data Protection

How financial institutions can protect sensitive data for their customers by integrating threat intelligence into their security strategies.

Read More

, , , , ,

How MSPs and Resellers Should Approach Cybersecurity

What are the threats facing credential security? How partners can take steps to prevent their clients from falling victim to them?

Read More