Video: Credential Stuffing (Core Identity and Access Management Part 1 of 8)

Video: Credential Stuffing (Core Identity and Access Management Part 1 of 8)

Credential Stuffing is not a new attack. Rather it is an existing attack that threat actors have found a way to operate at economies of scale. Credential stuffing is a type of automated threat used to verify the validity of stolen account credentials through a large-scale automated login process against a web application and has been around for quite some time. In this video, Kayne McGladrey, Integral Partners Director of Information Security Services will show:

? how threat actors can purchase stolen credentials on the dark web

? what their process is for credential stuffing

In this first episode in the series of 8 about Identity and Access Management, you will better understand how a consulting organization can protect against credential stuffing, and other identity based threats.

要查看或添加评论,请登录

Kayne McGladrey的更多文章

社区洞察

其他会员也浏览了