Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

The Outsized Risk From Small Data Breaches

There is a continuous stream of small data breaches that make no headlines but present outsized risks to individuals and organizations.

Read More

,

The Magician’s Handkerchief of Password Reuse

Why using the same password can compromise your online security, as Mike shares a personal account of the risks and lessons learned.

Read More

, ,

Massive Equifax Data Breach Puts Consumers at Risk for Identity Theft and Compromised Accounts

Equifax announced a massive data breach that exposes affected consumers to an increased risk of identity theft and compromised accounts.

Read More

,

Can Passwords Really Be Replaced?

We will continue to see passwords for a long time due to the many unique characteristics not found in other authentication methods.

Read More

, ,

NIST SP 800-63B Final Guidelines: Digital Identity Explained

NIST SP 800-63 final guidelines explained: learn what the standard covers for digital identity and password security.

Read More

, ,

Evolving Password-Based Security to Fight Compromised Credentials Attacks

Cybercriminal tactics have evolved, so organizations must evolve their password-based security against compromised credential attacks.

Read More

, ,

Why NIST Compromised Credential Checking Matters for Security

Learn why NIST requires compromised credential checking and how it improves password security under 800-63B.

Read More

,

LastPass Selects Enzoic for Compromised Credential Screening

PasswordPing’s compromised credential services will help LastPass better inform their users when their online credentials have been exposed.

Read More

, ,

Surprising NIST Password Guideline Changes in 800-63B

The US National Institute of Standards and Technology (NIST) just finalized new draft guidelines, completely reversing previous password security recommendations and upending many of the standards and best practices security professionals use when forming policies for their companies.

Read More

Hackers Use Compromised Credentials To Defraud 3rd Party Sellers on Amazon

Hackers are actively targeting those 3rd party sellers using stolen and compromised credentials (a password and user name combo) to gain access to the seller’s accounts, costing them tens of thousands of dollars.

Read More

LeakedSource Shut Down by DOJ

Last week, a breach notification site named LeakedSource was allegedly shut down by US law enforcement and much of their equipment confiscated. The reasons why they may have been targeted by law enforcement are unknown, although it's possible to hazard some guesses as to why. Were they White Hat, Black Hat or Grey Hat?

Read More

,

Enzoic Launches Exposed Password and Credentials API Service for Enterprises

PasswordPing announces the launch of its patent-pending password and credential breach notification service, which proactively notifies organizations if their users are using exposed credentials. Billions of accounts have been exposed in breaches and often the users are completely unaware of it.

Read More