
Sign up to save your podcasts
Or
This podcast episode from "Decoded: The Cybersecurity Podcast by Edward Henriquez" explains credential stuffing, a cyberattack that uses lists of leaked usernames and passwords to automatically attempt logins on various services, exploiting password reuse. The host, Edward Henriquez, details the mechanics of these attacks, including readily available tools and the significant volume of recorded attempts. The episode further explores the real-world impact on various sectors and outlines defensive strategies for both organizations and individual users. Finally, it touches upon the future of credential abuse, highlighting the potential integration of AI, and underscores the importance of proactive cybersecurity measures.
Patreon Support:
https://www.patreon.com/DecodedPodcast
This podcast episode from "Decoded: The Cybersecurity Podcast by Edward Henriquez" explains credential stuffing, a cyberattack that uses lists of leaked usernames and passwords to automatically attempt logins on various services, exploiting password reuse. The host, Edward Henriquez, details the mechanics of these attacks, including readily available tools and the significant volume of recorded attempts. The episode further explores the real-world impact on various sectors and outlines defensive strategies for both organizations and individual users. Finally, it touches upon the future of credential abuse, highlighting the potential integration of AI, and underscores the importance of proactive cybersecurity measures.
Patreon Support:
https://www.patreon.com/DecodedPodcast