Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Data Breaches

, , , ,

Corporate Account Takeover: What It Is, and What To Do

Corporate Account Takeover (CATO) is an organization-specific identity theft where cybercriminals steal employee passwords to gain access.

Read More

, ,

Data Breaches are a Cumulative Threat

the frequency of data breaches has climbed, along with the number of users impacted. Read why being in multiple breaches matter.

Read More

, ,

Should Your Business Prevent Leetspeak in Passwords?

What is leetspeak and how it leaves businesses vulnerable to attack. Start screening for common and compromised passwords.

Read More

, ,

Cyberdemic 2.0?

Let’s dig into Cyberdemic 2.0. In what ways are individuals the weak links, and how can companies help stop this trend?

Read More

, , ,

ITRC Breach Annual Report: Key Findings

The annual ITRC Data Breach Report provides statistics and perspectives on cyberattacks. Here’s what organizations need to know.

Read More

, ,

Cutting-Edge Threat Intelligence with Honeypot Networks and Integrative Data Systems

With credential stuffing attempts rising, understanding attacks with honeypots is a crucial tool in creating a dynamic & current security posture.

Read More

, , ,

Enzoic’s Threat Research: From Extensive Knowledge to Decisive Action

Effective threat intelligence for compromised credential screening involves discerning reconnaissance and real-time analysis and deployment.

Read More

, , ,

How Cybercriminals Hack “Encrypted” Passwords

Businesses employ one-way encryption using hashing to protect passwords. Unfortunately, one-way hash functions are not enough.

Read More

, ,

Healthcare Industry: Cybersecurity Vulnerabilities and How to Treat Them

There is a dangerous undercurrent running beneath many of the new healthcare-related technologies: cybercrime. Read how to protect against it.

Read More