SpyCloud Resources

Credential Stuffing Webinar Screenshot
Webinar

How Credential Stuffing Tools Are Made

Learn how credential stuffing works and get insights into the tools of the trade (including some very sophisticated custom Nintendo crimeware). Discover why stolen accounts that don’t have obvious monetary value can be profitable for cybercriminals.

Read More
Case Study

Global Managed Services Provider

SpyCloud enabled a global managed services provider to expand the value of their offering by adding credential monitoring services and increasing the quality of their threat intelligence reports—all without hiring additional staff.

Read More
Case Study

Zscaler

Zscaler is a cloud-based security company that is completely transforming the way companies approach information security.

Read More
Case Study

A Large US University

With few resources to dedicate to account takeover prevention, this large US university was settling for a mediocre security solution that required too much manual effort.

Read More
Case Study

Oklahoma University

With few internal resources or sufficient tools to identify and remediate exposed student, faculty and staff email accounts, OU was at constant risk for accounts being compromised.

Read More
Case Study

Global Networking Company

Discovering exposed user credentials across the global networking company’s many domains proved to be challenging using old, redundant, and undecrypted password data from an incomplete solution.

Read More
Case Study

Top 10 Travel Booking Site

Preventing account takeover begins with monitoring the dark web, but without the ability to match user accounts with a database of exposed credentials, a top 10 travel booking site was vulnerable to attack.

Read More
Case Study

Automattic

Password reuse is a constant issue that often leads to account takeovers, yet finding exposed credentials was a labor-intensive, manual task that didn’t capture every instance.

Read More
Case Study

Buckman

Preventing a security breach that impacts their customer data is a top priority for Buckman, yet without credential exposure reporting, they were at constant risk.

Read More

Stop exposures from becoming account breaches.