Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Account Takeover

, ,

The OpenID Shared Signals Framework

This post will clarify what SSF is, describe its approach, explain the roles of the CAEP and RISC, and outline the ways to work together.

Read More

, , ,

A Dive Into Organizational Identity-Based Threats

Ten critical organizational identity-based threats tied to compromised credentials that organizations should be aware of and defend against.

Read More

, , , ,

Achieving CyberSecure Canada Certification

CyberSecure Canada aims to help enterprises improve their security posture by implementing a baseline set of security controls.

Read More

, ,

Disorder in the Court: Unintended Consequences of ATO

The consequences of ATO can range from personal account hijacking to more severe impacts like corporate email breaches.

Read More

, , , , ,

Enzoic Acquires VeriClouds

VeriClouds and Enzoic signed an agreement to bring our customers a more innovative service under the Enzoic brand.

Read More

, , ,

E-commerce Fraud Prevention: Securing Your Business and Trust

Implementing an e-commerce fraud prevention strategy provides businesses with long-term success while providing a secure shopping experience for consumers.

Read More

, , ,

MFA Vulnerabilities, ATO, and the Importance of Password Security

The Microsoft 2024 Digital Defense Report exposes a hard truth—old-school password attacks are prevalent and effective.

Read More

, ,

AI, Infostealers, and Fresh Compromised Credentials

The aggregate lists of credentials extracted from infostealer logs, often referred to as “ULP” lists, remain in extremely high demand.

Read More

, , , ,

Updates on the Compromised Credential Landscape

Infostealer malware has led to an increase in credential compromise with threat actors exploiting password managers and targeting RMM tools.

Read More