User Enumeration in a Production Environment – Credential Stuffing 101

By |2022-08-24T15:15:37-04:00July 19, 2021|Blog|

Ah yes, credential stuffing! Almost as common as thanksgiving stuffing, yet as distasteful as black Friday shopping. Credential stuffing is especially effective when it’s coupled with user enumeration. The likelihood of user enumeration attacks occurring ...

Is your penetration testing vendor just trying to sell you products and services?

By |2022-08-24T15:16:48-04:00September 17, 2020|Blog|

Not too long ago, while working at another company, I was subjected to a presentation by a paid speaker at our annual sales kickoff meeting.  Since I was heavily focused on security consulting solutions for ...

Go to Top