Syndicated Blog

Blog | Enzoic
Detect Compromised Credentials

Privileged Account Security in Active Directory

Privileged accounts in Active Directory (AD) are the keys to your organization’s most sensitive systems, data, and administrative tools. These accounts play an essential role in managing access and keeping things running ...
Disorder in the Court: Unintended Consequences of ATO

Disorder in the Court: Unintended Consequences of ATO

The most common ATO threat that individuals and businesses imagine affecting them is their accounts getting hijacked- e.g. a threat actor uses credential stuffing to login to your netflix account, and enjoys ...

Enzoic Acquires VeriClouds

VeriClouds and Enzoic signed an agreement to bring our customers a more innovative service under the Enzoic brand ...

E-commerce Fraud Prevention: Securing Your Business and Trust

Implementing an e-commerce fraud prevention strategy provides businesses with long-term success while providing a secure shopping experience for consumers ...
CSF

Secure Better Rates for Cyber Liability Insurance

Following NIST password guidelines helps organizations secure better rates on their cyber liability insurance ...
MFA Vulnerabilities, ATO, and the Importance of Password Security

MFA Vulnerabilities, ATO, and the Importance of Password Security

The Microsoft 2024 Digital Defense Report exposes a hard truth—old-school password attacks are prevalent and effective ...
Police Blotter

Police Blotter

| | Cybersecurity, Threat Intel
Updates from Enzoic’s Threat Research Team Some good news this week in the form of infostealer infrastructure disruption as Dutch authorities claim to have shut down some threat actors operating instances of ...

Protecting Public Sector Organizations from the Threat of Compromised Credentials

Enzoic has partnered with CIS CyberMarket to enhance cybersecurity offerings for public sector organizations ...

AI, Infostealers, and Fresh Compromised Credentials

State of the Data We haven’t seen much week-to-week change lately in data volumes- infostealer logs unfortunately remain extremely prevalent with no signs of abatement. The aggregate lists of credentials extracted from ...

The Newest PSR Protections

What Organizations Should Know The PSR establishes economic regulations in the UK for payment systems. With APP scams (Authorised Push Payment scams) on the rise, the PSR has introduced groundbreaking new protections to ...