Answer:
Attackers use credential stuffing by reusing compromised credentials across multiple sites to gain unauthorized access.
Attackers use credential stuffing by reusing compromised credentials across multiple sites to gain unauthorized access.
You may be interested in:
Web Security MCQs - PART 2