In this webinar we take the hacker's perspective with a step-by-step guide and presentation of attack tools used by hackers.
You will learn what a credential stuffing attack is, and why it is so popular and what companies are usually targeted.
James Henry one of our Consulting Directors, Alan Lim a Penetration tester and Jan Broniowski from our development team discuss credential stuffing and how hackers go about using these techniques.
Comments