How to Address the Vulnerabilities in Open Banking Major cyberattacks have made international news repeatedly over the last years, and there is no indication that cyberattacks will be slowing down. It isn’t just ransomware that is a growing issue for the financial sector, but credential stuffing attacks that are posing major risks to banks and credit unions. In 2020, the …
The Reality of Compromised Credentials
Cracked Wide Open Over the past decade, the number of data breaches in almost all industries has skyrocketed. From healthcare to finance, user credentials have become both the tool of cyberattack and one of its primary targets. The 2021 Verizon DBIR report indicated that upwards of 61% of breaches involved leveraged credentials. Communicating clearly about the problem The Open Web Application …
Think You’re Smarter than a Hacker?
How long do you think it would take for someone to guess your password? Let’s say they knew you well. You’d start with combinations of your pet names and birth date, or where you work and your town. They might spend hours trying combinations, but the likelihood is, they wouldn’t independently be able to guess it. But as research has …
Retail Me This
As the impacts of the pandemic continue to ripple outwards, hackers are tapping into credential stuffing as an easy way to victimize both companies and individuals. The branching of events is easy to track with the rapid transition to remote work, e-commerce boom, and the millions of new online accounts for everything from grocery delivery to streaming services. The rapidity …
Developing Active Defense from Password Spraying & Credential Stuffing
Microsoft Active Directory (AD) is ubiquitous across the corporate landscape; you probably use it to authorize access at almost every level. Due to its popularity and importance, AD is a perfect target for cyber attacks. Hackers frequently use password spraying and credential stuffing as attack methods, especially against AD. With many traditional password ‘best practices’ being outdated, are you prepared …
Pride and Passwords: Top Hacking Methods & How to Prevent Them
Cybersecurity is becoming a pressing issue for IT professionals in all fields. There are headlines every week about data breaches of all sizes and the attacks themselves come from many angles. This article details the password attack methods hackers frequently used against enterprises and provides solutions as to how your business can prevent damage or breaches. 1. Dictionary Attacks A …
The Skinny on Password Attacks
Thousands of Canadian citizens are at risk of identity fraud after cybercriminals used stolen credentials to access government services including COVID-19 relief funds. The source of the breach was a credential stuffing attack utilizing logins exposed in a prior breach. This is the latest example in a steady stream of data breaches driven by poor password practices. The Verizon DBIR …
8 Ways to Mitigate Credential Stuffing Attacks
We all know that data breaches have leaked billions of user credentials (usernames and passwords) on the public internet and dark web. The Global Password Security Report shows an alarming 50% of people reuse the same passwords across their personal and work accounts. If a cybercriminal obtains legitimate credentials for a personal account, they often can also get into that person’s work account because …
Enzoic Part of Enterprise Security Magazine’s Top 10 Identity and Access Management Solution Providers for 2019
Enzoic is proud to be part of Enterprise Security Magazine’s Top 10 Identity and Access Management Solution Providers for 2019. Enzoic was selected to be part of this exclusive list because of the uniqueness of the technology along with the low-friction way the product helps prevent account takeover and fraud. In the past decade, over 10 billion records have been …
Credential Stuffing Attacks vs. Brute Force Attacks
The Open Web Application Security Project (OWASP), a non-profit that is dedicated to web application security, classifies credential stuffing as a subset of brute force attacks. However, in practice, the two types of cyber-attacks use very different methods to accomplish an account takeover and fraud. To explore how credential stuffing attacks and brute force attacks differ, we need to understand …