About this webinar
What is a credential stuffing attack? Why it is so popular? What companies are usually targeted? A hacker perspective: step-by-step guide and presentation of attack tools used by crackers. James Henry one of our Consulting Directors, Alan Lim a Penetration tester, and Jan Broniowski from our development team discuss credential stuffing and how hackers go about using these techniques.
Jan Broniowski, Senior Software Architect;
Alan Lim, Senior Penetration Tester
James Henry, Consulting Director at Crossword Cybersecurity PLC
Share this event