Credential Stuffing and the Future of Account Takeovers

Thank you for your submission.  Your webinar access will be delivered to your inbox shortly. If you have access issues, please email thef5team@f5.com

Cyberattacks have evolved since the advent of online transacting almost 25 years ago, with attackers continually escalating and refining their techniques to protect their illicit revenue streams. Today, attackers and fraudsters can call upon a sophisticated suite of tools, including human-powered click farms, social engineering, and malware – all designed to defeat traditional defences.

In this session, you will:

Understand how application attacks have evolved over the past 10 years and get insight into where attacks are going

Discover how sophisticated cybercriminals imitate humans and circumvent traditional defences such as WAFs, CAPTCHAs, and browser fingerprinting

Learn how organisations can protect their customers and brand without compromising user experience or collecting personal data



Jarrod Overson
Director Product Development


Alfredo Vistola
Senior Global Solutions Architect Security