Credential stuffing attacks pose a significant risk to consumers and businesses. Learn how they work and what you can do about them.