Antoine Vastel is joining Castle as Head of Research

Antoine Vastel is joining Castle as Head of Research

| | company
Bot detection is broken. Attackers have moved far beyond basic bot scripts—they’re leveraging AI, residential proxies, and sophisticated hybrid automation that easily defeats traditional detection methods. Yet many vendors still treat bot detection as a simple feature, relying on outdated techniques that no longer work. Security ... Read More
Fixing the blind spots in fraud prevention

Fixing the blind spots in fraud prevention

|
Fraud prevention fails when you can’t see what’s happening on your platform. Most companies rely on basic fraud prevention tools that only scratch the surface, leaving them blind to deeper patterns of fraud, account takeover, and even financial crimes like money laundering and identity theft. Without ... Read More
8 Common Types of Account Abuse

8 Common Types of Account Abuse

|
Leading platforms like Canva, Atlassian, Figma, Notion, and Dropbox have completely transformed the modern workspace. They have brought productivity to new heights and made online collaboration effortless. However, the widespread shift towards digital work has unintentionally given rise to new security vulnerabilities.Industries such as e-commerce and financial services have ... Read More
Castle & Twilio Segment – Instant Account Defense

Castle & Twilio Segment – Instant Account Defense

|
Securing apps and users from account abuse has long been a resource-draining challenge for security and fraud teams, irrespective of company size. The setup process alone can span months, if not years, with the complexity and need for maintenance escalating over time.Castle has just flipped the script. As a ... Read More
How to Prevent Account Sharing Like Netflix

How to Prevent Account Sharing Like Netflix

|
For an early stage company, the focus often lies in attracting users and expanding the customer base. Land and expand. During this phase, account sharing may not be perceived as a significant problem. However, as the business matures and revenue optimization becomes the primary focus, the detection and management of ... Read More
Which CAPTCHA(s) Should I Use?

Which CAPTCHA(s) Should I Use?

|
In a world where bots have outnumbered humans, CAPTCHA solutions have become the standard approach to keep your apps and users safe from automated attacks. These tools require users to solve straightforward puzzles or tests, thus verifying their human identity and ruling out bot activity.For a developer, incorporating a ... Read More
The Different Forms of Online Abuse

The Different Forms of Online Abuse

|
Fighting fraud is serious business for companies, even when they have clear rules and steps to follow. However, its evil twin abuse can show up in different ways - from out-and-out illegal actions to things that just go against a website's rules or standards. We're going ... Read More
From Spam to Scams: How to Handle Fraud vs. Abuse

From Spam to Scams: How to Handle Fraud vs. Abuse

|
In the early stages of a startup, your primary focus is often on growth and development. Goals are set around attracting users, refining the product or service offering, and scaling up in general. During this phase, online abuse can seem like a distant concern, often taking a backseat to more ... Read More
7 Fraud Prevention Rules Using Device Fingerprinting

7 Fraud Prevention Rules Using Device Fingerprinting

|
In a previous article, 9 Device Fingerprinting Solutions for Developers, I outlined a set of open source and commercial solutions for device fingerprinting. What I didn't dig into in that article is how the fingerprints are actually used in preventing fraud.One misconception is that a fingerprint alone ... Read More
11 Ways to Pinpoint a User's True Location

11 Ways to Pinpoint a User’s True Location

|
Hi 👋 – I'm the founder of Castle, a developer-first fraud prevention platform that helps you automatically collect and analyze a user’s location based on location indicators–one of many features available.In this post, I delve into various methods for predicting user location and ... Read More