Threat Intel

Unhealthy Cybersecurity Postures
Updates from Enzoic’s Threat Research Team In the last Enzoic research update, we briefly discussed the travails of the healthcare industry and their challenges in establishing a successful cybersecurity posture in the ...

Credit Card Fraud: How Does It Work?
A deep dive into some real-live techniques and scripts used by threat actors to commit credit card fraud. See the actual steps involved ...

Early Trends in 2025
With every new year bringing new technologies, expanding attack surfaces, and legions of salivating threat actors ...
Fortune 500 Employees’ Credentials Under Siege
1 in 10 Fortune 500 employees had their credentials exposed. Each compromised account was found an average of 5.7 times ...

ATO Attacks from a Threat Intel Perspective
The battle against ATO attacks is one of speed, scale, and sophistication and defenders are dealing with an overwhelming influx of data ...
Rethinking Credential Security
Whether you're a CISO or a security professional this Q&A is packed with credential security insights you can implement today ...
Reflecting on a Year of Compromised Data
The cybersecurity landscape over the past 12 months shows that It’s been a banner year of compromised credential data collection ...

Disorder in the Court: Unintended Consequences of ATO
The most common ATO threat that individuals and businesses imagine affecting them is their accounts getting hijacked- e.g. a threat actor uses credential stuffing to login to your netflix account, and enjoys ...

Police Blotter
Updates from Enzoic’s Threat Research Team Some good news this week in the form of infostealer infrastructure disruption as Dutch authorities claim to have shut down some threat actors operating instances of ...
AI, Infostealers, and Fresh Compromised Credentials
State of the Data We haven’t seen much week-to-week change lately in data volumes- infostealer logs unfortunately remain extremely prevalent with no signs of abatement. The aggregate lists of credentials extracted from ...