Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

, , ,

We’ll See Escalating Threats From the Software Supply Chain

A partnership to help customers in the fight against software supply chain attacks and act at the first sign of compromise.

Read More

, , ,

Enzoic for AD Lite Data Shows Increase in Crucial Risk Factors

The analysis from over 8 million user accounts scanned by Enzoic reveals nearly 15% (1.2MM) of accounts were found to be using unsafe passwords.

Read More

, ,

The Cracks in Microsoft’s Entra ID

Microsoft's Entra ID, previously known as Azure Active Directory Password Protection might not be enough to protect your passwords.

Read More

, ,

Taylor Swift’s Influence on Cybersecurity

Taylor Swift inadvertently influenced the world of authentication. Here are the top 10 most common Taylor Swift passwords.

Read More

, ,

How AI and Compromised Credentials are Fueling Spear Phishing Attacks

Remain informed of the latest advancements in AI and social engineering to effectively protect their organizations.

Read More

,

2024 Cybersecurity Outlook

In 2024, organizations need to adapt proactively to emerging trends, fortify their defenses, and leverage the positive aspects of AI.

Read More

, ,

Australia’s Cybersecurity Commitment: A Detailed Overview

Australia has taken significant strides in enhancing its cybersecurity infrastructure, driven by a comprehensive government strategy.

Read More

, , ,

Debunking MFA Myths: How to Stay Secure

MFA is not invincible. The persistence of compromised credentials as an entry vector for data breaches is a testament to this vulnerability.

Read More

,

The Gift of Cybersecurity

The holiday season is a bustling time ushering in increased cyber threats. Hackers will be poised to exploit weak and compromised passwords.

Read More