credential stuffing

12 Years Later: Common Configuration Flaw + Internet of Things = Massive Attacks

In-brief: A common configuration flaw may be behind a massive network of IoT devices used in “credential stuffing” attacks, according to the security firm Akamai.