BEC Attack Prevention

BEC Attack Prevention

Once attackers have valid credentials, they gain unauthorized access to email accounts, making it much easier to carry out a BEC attack ... Read More
Enhancing AD Security Against Password Spraying Attacks

Enhancing AD Security Against Password Spraying Attacks

Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls ... Read More
stealer logs

The Past Month in Stolen Data

Infostealers, Data Breaches, and Credential Stuffing Unquestionably, infostealers still take the top spot as the most prominent source for newly compromised credentials (and potentially other PII as well). Access brokers are buying, selling, trading, collecting, packaging, and distributing the raw logs and collections of the extracted stolen credentials at a ... Read More
Screenconnect RMM

Updates on the Compromised Credential Landscape

| | all posts
Recent Trends The surge in infostealer malware has led to an alarming increase in credential compromise, significantly impacting both individuals and organizations. With threat actors exploiting password managers and targeting remote monitoring and management (RMM) tools, it’s crucial to stay informed about these threats. Infostealer Malware Fuels Credential Compromise We’ve ... Read More
Microsoft Entra ID Password Protection in Hybrid Environments

Microsoft Entra ID Password Protection in Hybrid Environments

Can Entra ID continually defend against exposed passwords in new data breaches as businesses operate across a hybrid environment? ... Read More
ENTRA

Microsoft Entra ID Password Protection: Overcoming the Limitations

Microsoft Entra ID is one of the tools many organizations rely on to protect their passwords, but is it enough? Understand the limitations ... Read More

Public Sector Compliance: Passwords and Credentials Matter

Helping government agencies and organizations operating in the public sector navigate password and credential security ... Read More
Enzoic APIs Flow

Betting, Gambling, and Sports Betting Sites: The Costs of ATO

| | , Data breaches
The most prevalent and damaging attack plaguing the online betting and gambling industry is fraud stemming from account takeover ... Read More

Harmonizing Security and Usability to Tackle Account Takeover

| | , Data breaches
Account takeover (ATO) has become a significant threat to online platforms and consumers, costing billions annually. With the increasing digitization of services, threat actors have found numerous ways to exploit stolen credentials, resulting in account takeovers across various sectors. The challenge for organizations lies in balancing strong security measures with ... Read More

Navigating Compliance: Password and Credential Security

In today’s digital age, the threat of cyberattacks is growing at an alarming rate. The frequency and impact of these attacks are escalating, prompting governments and industry bodies to introduce a slew of regulations designed to protect sensitive data. However, this has created a complex web of legislation that companies ... Read More