echoudhury77Dec 27, 20182 min readIT Fundamentals The last few years have seen a surge of breaches ranging from credential stuffing to brute force attacks.