credential stuffing

Forced Password Reset? Check Your Assumptions

Almost weekly now I hear from an indignant reader who suspects a data breach at a Web site they frequent…

1 year ago

State Farm Says Security Incident Might Have Exposed Customers’ Data

Insurance company State Farm revealed that a digital security incident might have exposed their customers’ personal information. In August 2019,…

1 year ago

How to Prevent Insider Data Breaches at your Business

Guest article by Dan Baker of SecureTeamMajority of security systems are installed to try and forestall any external threats to a business’…

1 year ago

Tackling the Issue of Online Gaming Credential Stuffing

When it comes to cyberattacks, what causes them and the risks they pose, our attention focuses primarily on the most…

1 year ago

Enzoic Part of Enterprise Security Magazine’s Top 10 Identity and Access Management Solution Providers for 2019

Enzoic is proud to be part of Enterprise Security Magazine’s Top 10 Identity and Access Management Solution Providers for 2019. …

2 years ago

Credential Stuffing Attacks vs. Brute Force Attacks

The Open Web Application Security Project (OWASP), a non-profit that is dedicated to web application security, classifies credential stuffing as…

2 years ago

Cyber Security Roundup for April 2019

The UK government controversially gave a green light to Huawei get involved with the building of the UK's 5G networks, although the Chinese tech…

2 years ago

What your login success rate says about your threat surface

One of the problems with imitation attacks such as sophisticated credential stuffing is that they are designed to blend in…

2 years ago

Can You Crack the Hack?

Let’s play a game. Below are clues describing a specific type of cyberattack; can you guess what it is? This…

2 years ago

The Risk of Credential Stuffing to the Smart Home

As technology advances and the costs of connecting electronic components to the internet decreases, the lower the cost of having…

2 years ago