Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Cybersecurity

, , ,

I Failed a Pentest: What do I Do?

Steps you should take after failing a pentest and focusing on addressing the vulnerabilities found and ensuring there are no compromises.

Read More

, , ,

How to Mitigating Credential Stuffing Attacks

A single compromised credential can trigger a broader security disaster. Companies must prioritize defending against credential stuffing attacks.

Read More

, , , , ,

2024 Verizon DBIR: Key Thoughts

It remains clear: stolen credentials are a consistent and continuous threat to organizations. Here are details from the 2024 Verizon DBIR.

Read More

,

2024 RSA Conference Recap

Here are some of the key topics from this year’s 2024 RSA conference. It was an enlightening gathering, uniting cybersecurity experts.

Read More

, , ,

Pew Research Data Privacy Statistics 2024

Pew Research Center sheds light on Americans' growing unease with how their personal information is handled. This post explores highlights the challenges and concerns surrounding data breaches and compromised credentials.

Read More

, , , , ,

CISA Warns of Compromised Microsoft Accounts

The directive is known as Emergency Directive 24-02 addresses the risk of compromised Microsoft accounts for federal agencies & corporations.

Read More

, , , , ,

What is Session Hijacking?

Session hijacking is a prevalent and dangerous attack method to illicitly gain access and then take control of user accounts and systems.

Read More

, , , , ,

What Makes a Password Weak or Strong?

The crucial differences between weak and strong passwords. We will also provide practical tips on how to bolster your online security.

Read More

, , , ,

A Keystone of Cybersecurity for Water and Wastewater Infrastructure: Strong Passwords

The White House put out an official letter warning of severe cyberattacks directed at water and wastewater infrastructure across the country.

Read More