Skip to main content

Tom Ellson

Tom is experienced in enabling JUMPSEC clients to achieve their security objectives and improve their resilience to a cyber attack. Tom understands where technical weakness and business risk intersect, ensuring clients maximise return on investment.

Thom explains credential stuffing.

Thom from our technical team gives an explanation of what credential stuffing is

https://www.youtube.com/watch?v=7IsvyGRniMs

Video transcript:

When professionals mention credential stuffing attacks, what they are usually referring to is the process of brute-forcing username-password pairs into applications in order to get a valid login.

For an attacker, this process can be automated to iterate through hundreds of thousands of credentials – perhaps captured from data breaches – to find a correct username-password pair. Valid combinations may be used by attackers to conduct fraud, or as a way of discovering passwords a user is likely to use – this information can then be used on yet more services.

×

Under attack? Call our 24/7 Incident Response Hotline now

Get in touch with an accredited Incident Response experts who can help you contain, recover and mitigate attacks.

0333 987 4048

For regular switchboard please
contact - 0333 939 8080