Threat Intel

Disorder in the Court: Unintended Consequences of ATO
The most common ATO threat that individuals and businesses imagine affecting them is their accounts getting hijacked- e.g. a threat actor uses credential stuffing to login to your netflix account, and enjoys ...

Police Blotter
Updates from Enzoic’s Threat Research Team Some good news this week in the form of infostealer infrastructure disruption as Dutch authorities claim to have shut down some threat actors operating instances of ...
AI, Infostealers, and Fresh Compromised Credentials
State of the Data We haven’t seen much week-to-week change lately in data volumes- infostealer logs unfortunately remain extremely prevalent with no signs of abatement. The aggregate lists of credentials extracted from ...

Enhancing AD Security Against Password Spraying Attacks
Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls ...

The Past Month in Stolen Data
Infostealers, Data Breaches, and Credential Stuffing Unquestionably, infostealers still take the top spot as the most prominent source for newly compromised credentials (and potentially other PII as well). Access brokers are buying, ...

[Updated] Iran Cyber Threat Resource Center: How to Navigate Amid Geopolitical Conflicts and Tensions
September 25, 2024 Update: Added two recently identified backdoor malware, Spearal & Veaty, linked to the OilRig espionage group Added numerous Exploited VulerabilitiesVulerabilities enrichments for several of the actor groups highlighted below ...
The TIDE: EDRKillShifter, Ransomware Tools, ExtraHop, Wiz
We haven’t had a version of The TIDE: Threat-Informed Defense Education blog for a bit now, but that is largely because our team has been so busy putting what our customers need ...

Update from the Ransomware Trenches
Authors: Rui Ataide, Hermes Bojaxhi GuidePoint’s DFIR team is frequently called upon to respond to Ransomware incidents. While many such […] ...

Enzoic Dark Web Data Integration with ITDR Solutions
For ITDR solutions, addressing compromised credentials head-on is crucial to protecting end users' environments ...

Google Threat Horizon Analysis
The Google Threat Horizons report found that cloud computing services are facing increasing threats of compromise and abuse ...