Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Data Breaches

, , , , ,

CISA Warns of Compromised Microsoft Accounts

The directive is known as Emergency Directive 24-02 addresses the risk of compromised Microsoft accounts for federal agencies & corporations.

Read More

, , , , ,

What is Session Hijacking?

Session hijacking is a prevalent and dangerous attack method to illicitly gain access and then take control of user accounts and systems.

Read More

, , , , ,

What Makes a Password Weak or Strong?

The crucial differences between weak and strong passwords. We will also provide practical tips on how to bolster your online security.

Read More

, , ,

A Keystone of Cybersecurity for Water and Wastewater Infrastructure: Strong Passwords

The White House put out an official letter warning of severe cyberattacks directed at water and wastewater infrastructure across the country.

Read More

,

Millions Impacted in Mass Passcode Reset of AT&T Accounts

AT&T has initiated a mass reset of millions of customer account passcodes following a reported data breach.

Read More

, , , , ,

How MSPs and Resellers Should Approach Cybersecurity

What are the threats facing credential security? How partners can take steps to prevent their clients from falling victim to them?

Read More

,

Charting a Course for Cybersecurity

The cybersecurity arena is poised for continual challenges. Given the tactics we saw last year, here are some anticipated patterns likely to emerge.

Read More

, ,

IBM X-Force Threat Intelligence Index 2024

The latest IBM® X-Force® Threat Intelligence Index 2024 focuses on the increasing preference of valid credentials as an initial access vector.

Read More

,

Don’t Brush Off the Toothbrush Story

The toothbrush story serves as an important reminder that IoT devices remain a sought-after hacker target.

Read More