Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Credential Screening

, , , ,

Password Spraying and Credential Stuffing: Developing Active Defense

Hackers frequently use password spraying and credential stuffing as attack methods. Are you prepared to take an active stance of defense?

Read More

, , , ,

A Benchmark for Your Unsafe Passwords

Read just how big the problem of compromised credentials may be for a company like yours and to provide a benchmark based on Enzoic’s audit.

Read More

, ,

Understanding Bot Mitigation Limitations

Take a look at the limitations of bot mitigation and read where compromised credential screening can be highly complementary.

Read More

,

Exposure of NIH, WHO, and Gates Foundation Credentials Underscores the Critical Importance of Credential Screening

Compromised credentials can be quickly shared and utilized by various groups with malicious intent. Almost immediately following the release of the information, groups began using them to attempt to hack and harass organizations.

Read More

,

Questions To Ask When Considering A Credential Screening Solution

Credential screening providers are partners who help mitigate the risks of cyberattacks. Choosing the right one can prevent exposure of additional risks.

Read More

, , ,

Credential Stuffing Attacks vs. Brute Force Attacks

Credential stuffing and brute force attacks are different threats. Understand how they work and how to defend against both.

Read More

, ,

FTC Creates De-Facto Legal Requirements for Credential Stuffing & Account Takeover

The FTC is sending a strong message that businesses will no longer be able to play the victim-card. Instead, they are responsible for protecting their customers from credential stuffing and account takeover.

Read More

,

LastPass Selects Enzoic for Compromised Credential Screening

PasswordPing’s compromised credential services will help LastPass better inform their users when their online credentials have been exposed.

Read More