Compromised Credentials: Tackling a Perpetual Weak Link

Attack Types
Account Takeover
Credential Stuffing
Michael Greene -- Enzoic
Oct 20, 2019
Billions of username and password combinations are circulating on the Internet and Dark Web from a record number of third-party data breaches. Since many people reuse passwords across multiple websites, cybercriminals can obtain credentials that can be used to gain unauthorized access to customer accounts.

This session outlines how compromised credentials pervasively threaten merchants, including insights on credential stuffing. Different options to minimize the impact of compromised credentials are also discussed, focused on the benefits a layered approach can offer.

Some content is hidden, to be able to see it login here Login

Blue-tinted background of a man watching a webinar

Host a Webinar with the MRC

Help the MRC community stay current on relevant fraud, payments, and law enforcement topics.
Submit a Request

Publish Your Document with the MRC

Feature your case studies, surveys, and whitepapers in the MRC Resource Center.
Submit Your Document

Related Resources

Cookies help us improve your website experience.
By using our website, you agree to our use of cookies.