Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Credential Screening

, , , ,

Enzoic Expands Automated Credentials Monitoring in Active Directory

The solution now continuously screens for both unsafe passwords and compromised full credentials reducing the risk of a cyberattack.

Read More

, , , ,

Password Spraying and Credential Stuffing: Developing Active Defense

Hackers frequently use password spraying and credential stuffing as attack methods. Are you prepared to take an active stance of defense?

Read More

, , , ,

A Benchmark for Your Unsafe Passwords

Read just how big the problem of compromised credentials may be for a company like yours and to provide a benchmark based on Enzoic’s audit.

Read More

, ,

Understanding Bot Mitigation Limitations

Take a look at the limitations of bot mitigation and read where compromised credential screening can be highly complementary.

Read More

,

Exposure of NIH, WHO, and Gates Foundation Credentials Underscores the Critical Importance of Credential Screening

Compromised credentials can be quickly shared and utilized by various groups with malicious intent. Almost immediately following the release of the information, groups began using them to attempt to hack and harass organizations.

Read More

,

Questions To Ask When Considering A Credential Screening Solution

Credential screening providers are partners who help mitigate the risks of cyberattacks. Choosing the right one can prevent exposure of additional risks.

Read More

, , ,

Credential Stuffing Attacks vs. Brute Force Attacks

Credential stuffing & brute force attacks use very different methods to accomplish account takeover. This article outlines what they are, how they operate and how to handle them.

Read More

,

LastPass Selects Enzoic for Compromised Credential Screening

PasswordPing announces a new partnership providing LastPass customers with a quick and easy way to screen for individual and enterprise user credentials against a database of billions of compromised credentials. With PasswordPing, LastPass is able to identify high risk end users and put additional security measures in place, such as email alerts and real-time in-product notifications, to block account hijacking attempts and other fraudulent activities.

Read More

, , ,

What the Heck is “Credential Stuffing”?

Billions of user credentials (usernames and passwords) have been exposed publicly over the last few years. The natural question that comes up is “what do cybercriminals do with these stolen credentials?”

Read More