About this event
What is a credential stuffing attack? Why it is so popular? What companies are usually targeted? A hacker perspective: step-by-step guide and presentation of attack tools used by crackers. James Henry one of our Consulting Directors, Alan Lim a Penetration tester, and Jan Broniowski from our development team discuss credential stuffing and how hackers go about using these techniques.
Jan Broniowski, Senior Software Architect;
Alan Lim, Senior Penetration Tester
James Henry, Consulting Director at Crossword Cybersecurity PLC
Crossword Cybersecurity plc focuses on commercialisation of university research-based cyber security and risk management software and cyber security consulting.