Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Cybersecurity

, ,

Taylor Swift’s Influence on Cybersecurity

Taylor Swift inadvertently influenced the world of authentication. Here are the top 10 most common Taylor Swift passwords.

Read More

, ,

How AI and Compromised Credentials are Fueling Spear Phishing Attacks

Remain informed of the latest advancements in AI and social engineering to effectively protect their organizations.

Read More

,

2024 Cybersecurity Outlook

In 2024, organizations need to adapt proactively to emerging trends, fortify their defenses, and leverage the positive aspects of AI.

Read More

, ,

Australia’s Cybersecurity Commitment: A Detailed Overview

Australia has taken significant strides in enhancing its cybersecurity infrastructure, driven by a comprehensive government strategy.

Read More

, , ,

Debunking MFA Myths: How to Stay Secure

MFA is not invincible. The persistence of compromised credentials as an entry vector for data breaches is a testament to this vulnerability.

Read More

, ,

Key Points from ‘Defending Against the Infostealer Threat’

Defending Against the Infostealer Threat: Learn how to stymie the flow of attacks and protect your personal information with Enzoic's real-time alerts for compromised data.

Read More

,

Highs and Lows of the Microsoft Digital Defense Report

Microsoft’s Digital Defense Report (MDDR) provides data-driven, actionable takeaways. Read what businesses can do to improve their defenses.

Read More

, ,

Getting Back to Security Basics in the Age of AI

Everyone is talking about AI, but AI-driven security solutions won’t deliver until companies address the basics of defensive security.

Read More

, , , ,

Infostealers: A Threat Spreading like Wildfire

Infostealers have moved from a ‘consumer vulnerability’ to an organizational one. With a perfect storm of circumstances at hand.

Read More