account takeover
The OpenID Shared Signals Framework
This post will clarify what SSF is, describe its approach, explain the roles of the CAEP and RISC, and outline the ways to work together ...
A Dive Into Organizational Identity-Based Threats
Ten critical organizational identity-based threats tied to compromised credentials that organizations should be aware of and defend against ...
Achieving CyberSecure Canada Certification
CyberSecure Canada aims to help enterprises improve their security posture by implementing a baseline set of security controls ...
Disorder in the Court: Unintended Consequences of ATO
The most common ATO threat that individuals and businesses imagine affecting them is their accounts getting hijacked- e.g. a threat actor uses credential stuffing to login to your netflix account, and enjoys ...
Enzoic Acquires VeriClouds
VeriClouds and Enzoic signed an agreement to bring our customers a more innovative service under the Enzoic brand ...
Strategies to Stop Credential Stuffing Attacks on Mobile Apps
Identity-based and social engineering attacks are surging in 2024. Stolen credentials give hackers immediate access and control… and an instant path to stealing data and orchestrating ransomware attacks. Credential stuffing attacks ...
E-commerce Fraud Prevention: Securing Your Business and Trust
Implementing an e-commerce fraud prevention strategy provides businesses with long-term success while providing a secure shopping experience for consumers ...
How Cloud Monitor Helps Centennial School District Combat Account Takeovers
In our latest webinar, we explored real-world cybersecurity and online safety incidents, focusing on strategies that K-12 technology staff can use to prepare for hidden digital threats. Our guest speakers Sal Franco, ...
MFA Vulnerabilities, ATO, and the Importance of Password Security
The Microsoft 2024 Digital Defense Report exposes a hard truth—old-school password attacks are prevalent and effective ...
AI, Infostealers, and Fresh Compromised Credentials
State of the Data We haven’t seen much week-to-week change lately in data volumes- infostealer logs unfortunately remain extremely prevalent with no signs of abatement. The aggregate lists of credentials extracted from ...