Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

, , ,

The Biggest Takeaway from the 2022 Verizon DBIR

DBIR: Compromised credentials are a main area of concern. The impact grows as both ransomware and supply chain attacks impact every industry.

Read More

, , , ,

Username and Password Pairs

Screen against compromised username & password pairs since compromised passwords are in nearly all hacking-related cybersecurity breaches

Read More

, ,

Intuitive ATO Protection

Intuitive ATO Protection starts by eliminating the reuse of compromised credentials on your site, to prevent credential stuffing, account takeover & fraud.

Read More

,

About Strong Passwords

Strong passwords are only strong if they are not compromised or exposed. Screen for compromised passwords and stop bad actors from accessing your accounts.

Read More

, , ,

Credential Stuffing Explained

Credential stuffing is a cybercrime technique where an attacker uses automated scripts to try each credential against a target web site.

Read More

, ,

Account Takeover Defined

Account Takeover (known as ATO) is a type of identity theft where a bad actor gains unauthorized access to an online account belonging to someone else.

Read More

, ,

Password Dictionary vs. Cracking Dictionary

A cracking dictionary is a massive list of expected passwords used to quickly crack or guess actual passwords. Learn more about cracking dictionaries.

Read More

, , , ,

Corporate Account Takeover: What It Is, and What To Do

Corporate Account Takeover (CATO) is an organization-specific identity theft where cybercriminals steal employee passwords to gain access.

Read More

, ,

Data Breaches are a Cumulative Threat

the frequency of data breaches has climbed, along with the number of users impacted. Read why being in multiple breaches matter.

Read More