Credential stuffing attacks: What are they and how to combat them
Tuesday, August, 11th, 2020
As a central authentication service that processes billions of logins a month, credential stuffing attacks are the most common threats we observe. at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.
In credential stuffing attacks, threat actors use stolen credentials from one breach to takeover users’ other accounts. This is effective because 65% of people reuse passwords across multiple accounts, according to Google. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.
Join Andrew Akers, Solutions Product Marketing Manager, and Jamie Hughes, Lead Solutions Engineer, at Auth0 to learn:
How credential stuffing attacks work
What effect they can have on your company
How Auth0 can help you detect and mitigate these attacks
Solutions Product Marketing Manager
Andrew Akers is a Solutions Product Marketing Manager at Auth0. He is focused on Anomaly Detection and other security capabilities. Before Auth0, Andrew worked on a variety of security analytics products at Cisco. He loves learning about technology, information security, and identity, and turning that knowledge into positive outcomes for Auth0 customers.
Lead Solutions Engineer
Jamie Hughes is a Lead Solutions Engineer at Auth0. He’s part of the team establishing Auth0’s success in the EMEA region. Jamie has a Software/DevOps engineering background and is now advising and enabling clients on all things identity, with a strong focus on Consumer Identity Management (CIAM/B2B).