Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Data Breaches

, , , ,

CISA Warns of Compromised Microsoft Accounts

The directive is known as Emergency Directive 24-02 addresses the risk of compromised Microsoft accounts for federal agencies & corporations.

Read More

, , , , ,

What is Session Hijacking?

Session hijacking is a prevalent and dangerous attack method to illicitly gain access and then take control of user accounts and systems.

Read More

, , , , ,

What Makes a Password Weak or Strong?

The crucial differences between weak and strong passwords. We will also provide practical tips on how to bolster your online security.

Read More

, , ,

Strong Passwords: A Keystone of Cybersecurity for Water and Wastewater Infrastructure

The White House put out an official letter warning of severe cyberattacks directed at water and wastewater infrastructure across the country.

Read More

,

Millions Impacted in Mass Passcode Reset of AT&T Accounts

AT&T has initiated a mass reset of millions of customer account passcodes following a reported data breach.

Read More

, , , , ,

How MSPs and Resellers Should Approach Cybersecurity

What are the threats facing credential security? How partners can take steps to prevent their clients from falling victim to them?

Read More

,

Charting a Course for Cybersecurity

The cybersecurity arena is poised for continual challenges. Given the tactics we saw last year, here are some anticipated patterns likely to emerge.

Read More

, ,

IBM X-Force Threat Intelligence Index 2024

The latest IBM® X-Force® Threat Intelligence Index 2024 focuses on the increasing preference of valid credentials as an initial access vector.

Read More

,

Don’t Brush Off the Toothbrush Story

The toothbrush story serves as an important reminder that IoT devices remain a sought-after hacker target.

Read More