Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Credential Screening

,

Previously Compromised Data: Why Credential Exposure Never Expires

Previously compromised data (PCD) drives account takeover through reused credentials. Learn why credential exposure persists.

Read More

, ,

Healthcare’s Identity Problem Isn’t Getting Better, It’s Getting Louder

Healthcare breaches rose 112% as attackers abused valid credentials and MFA bypass. Why password exposure is now healthcare’s biggest risk.

Read More

, , ,

Rising Risk of Compromised Credentials in AD

Analysis of Enzoic AD Lite scans shows compromised and weak credentials increased, exposing over 1 in 5 Active Directory accounts to risk.

Read More

, ,

Inside the Credential Economy

Threat research into compromised credentials. See how infostealer malware and ULP lists continue to drive data breaches and ATO.

Read More

, , , , ,

10 Identity and Credential Risk Questions for 2026

Identity and credential risk drives account takeover and lateral movement. Discover 10 questions enterprises should ask to reduce exposure.

Read More

, ,

NIS2 Compliance: Maintaining Credential Security

Strengthen NIS2 compliance by preventing weak and compromised passwords with Enzoic's continuous credential protection.

Read More

, , , ,

How AI Is Supercharging Credential Attacks

AI credential attacks are evolving fast. See how continuous credential defense detects, blocks, and prevents automated password abuse.

Read More

, ,

183 Million Credentials Misreported as a Gmail Breach

The 183M credentials came from infostealer logs. Learn why continuous password monitoring is essential for modern defense.

Read More

, , ,

Compromised Credential Detection vs. Password Policy Enforcement

Credential detection finds exposed passwords your policy can’t. Learn how continuous credential checks close the security gap.

Read More

, ,

Third-Party Breaches: Why Vendor Passwords Put Your Organization at Risk

Weak vendor passwords drive third-party breaches. Continuous monitoring stops exposed credentials from becoming enterprise risk.

Read More

, ,

Securing the Deal: Cyber Due Diligence for VC and PE Firms

See why VC and PE firms need domain breach monitoring and Active Directory security to protect portfolio company value.

Read More

, , ,

Continuous Zero Trust Authentication

Enable Continuous Zero Trust Authentication by verifying credential integrity, enforcing strong policies, and stopping account compromise.

Read More