Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

,

Don’t Brush Off the Toothbrush Story

The toothbrush story serves as an important reminder that IoT devices remain a sought-after hacker target.

Read More

, , ,

Don’t Forget About Credential Security in Active Directory

Active Directory is a rich repository of data like financial information, addresses, and other PII. It is exactly what many cybercriminals are after.

Read More

, , ,

Super Bowl of Passwords: Chiefs vs. 49ers in the Battle of Cybersecurity

Sports-related passwords are pretty common. With Super Bowl LVIII around the corner, check out the most common 49ers and Chiefs passwords.

Read More

, , ,

The BlackBerry Global Threat Intelligence Report: 4 Key Takeaways

The BlackBerry Global Threat Intelligence Report covers the ransomware landscape, specific attack patterns & summarizes actionable intelligence.

Read More

, , ,

We’ll See Escalating Threats From the Software Supply Chain

A partnership to help customers in the fight against software supply chain attacks and act at the first sign of compromise.

Read More

, , ,

Compromised Password Detection for Active Directory

The analysis from over 8 million user accounts scanned by Enzoic reveals nearly 15% (1.2MM) of accounts were found to be using unsafe passwords.

Read More

, ,

The Cracks in Microsoft’s Entra ID

Microsoft's Entra ID, previously known as Azure Active Directory Password Protection might not be enough to protect your passwords.

Read More

, ,

Taylor Swift’s Influence on Cybersecurity

Taylor Swift inadvertently influenced the world of authentication. Here are the top 10 most common Taylor Swift passwords.

Read More

, ,

How AI and Compromised Credentials are Fueling Spear Phishing Attacks

Remain informed of the latest advancements in AI and social engineering to effectively protect their organizations.

Read More