Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Data Breaches

, ,

The 2023 Data Breach Report and the 2024 Data Breach Industry Forecast

Key findings from the "2023 Data Breach Report" from ITRC and the "2024 Data Breach Industry Forecast" by Experian.

Read More

, , ,

4 Key Takeaways from the BlackBerry Global Threat Intelligence Report

The BlackBerry Global Threat Intelligence Report covers the ransomware landscape, specific attack patterns & summarizes actionable intelligence.

Read More

, , ,

We’ll See Escalating Threats From the Software Supply Chain

A partnership to help customers in the fight against software supply chain attacks and act at the first sign of compromise.

Read More

, , ,

Enzoic for AD Lite Data Shows Increase in Crucial Risk Factors

The analysis from over 8 million user accounts scanned by Enzoic reveals nearly 15% (1.2MM) of accounts were found to be using unsafe passwords.

Read More

, ,

How AI and Compromised Credentials are Fueling Spear Phishing Attacks

Remain informed of the latest advancements in AI and social engineering to effectively protect their organizations.

Read More

,

2024 Cybersecurity Outlook

In 2024, organizations need to adapt proactively to emerging trends, fortify their defenses, and leverage the positive aspects of AI.

Read More

, ,

Australia’s Cybersecurity Commitment: A Detailed Overview

Australia has taken significant strides in enhancing its cybersecurity infrastructure, driven by a comprehensive government strategy.

Read More

, , , ,

Debunking MFA Myths: How to Stay Secure

MFA is not invincible. The persistence of compromised credentials as an entry vector for data breaches is a testament to this vulnerability.

Read More

, ,

Key Points from ‘Defending Against the Infostealer Threat’

Defending Against the Infostealer Threat: Learn how to stymie the flow of attacks and protect your personal information with Enzoic's real-time alerts for compromised data.

Read More