Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing MFA

, , , , ,

What is Session Hijacking?

Session hijacking is a prevalent and dangerous attack method to illicitly gain access and then take control of user accounts and systems.

Read More

, , , ,

Debunking MFA Myths: How to Stay Secure

MFA is not invincible. The persistence of compromised credentials as an entry vector for data breaches is a testament to this vulnerability.

Read More

, , ,

CISA: The Risk of MFA Without Improving Password Security

CISA alert helps cybersecurity professionals understand that MFA alone is insufficient. Make sure to secure each authentication layer.

Read More

, , , ,

CISA Adds Single-Factor Authentication to List of Bad Practices

The Cybersecurity and Infrastructure Security Agency (CISA) announced adding single-factor authentication to their list of Bad Practices.

Read More

, , ,

What Does It Take to Be Secure with Multi-Factor Authentication?

Passwords, nearly a universal factor in every MFA solution, need to be fortified against risks that come from password reuse & data breaches.

Read More

, , ,

Mixing It Up – Defending Against a Blended MFA Attack

Take a proactive approach to protect each layer in your MFA solution. Don't be susceptible to being hacked.

Read More

, , ,

Hacking MFA the Technical Way and How to Guard Against These Attacks

Read the ways hackers gain unauthorized access via technical methods to overcome MFA security. Start protecting your business today.

Read More

, ,

Cracking Multi-Factor Authentication on the Cheap

Having MFA associated with your phone number feels comforting, but it’s also plagued by hackers looking for new methods of attack.

Read More

, , ,

How Social Engineering Tactics Can Crack Multi-factor Authentication

MFA security vulnerabilities. How scammers wield social engineering techniques against MFA and what you can do to defend your systems.

Read More