Credential Stuffing — how it’s done and what to do with it?
Technically it is a very basic and easy to understand attack closely related to brute force techniques, yet it is frighteningly effective.