How Bots and AI Are Fueling Disinformation
Disinformation is hardly new, yet its impact is undeniably amplified in the digital age. AI-enabled bots are amplifying the noise ... Read More
5 Key Findings from the 2024 State of Bot Mitigation Survey
The 4th annual survey exclusively from the perspective of technology professionals who are already using anti-bot solutions at their companies ... Read More
No Trespassing: Challenges In Stopping Unauthorized AI Data Scraping
Data scrapers used to train LLMs can be evasive. Here's our recent view of AI data scraping attempts against Kasada customers ... Read More
I purchased a luxury vacation to Aruba for only $151.73 – thanks to credential stuffing
Travel accounts are attractive targets for fraudsters. Once access is gained, they can easily book vacations, transfer points, or sell accounts on the dark web ... Read More
AI Data Poisoning: How Misleading Data Is Evading Cybersecurity Protections
Discover why AI data poisoning is an emerging threat and how fake data is used to evade AI cybersecurity protections ... Read More
Kasada Achieves AWS Retail Competency and is Now Available in Marketplace
Makes it easy to buy, integrate, and realize immediate value when using Kasada and AWS edge security services together ... Read More
Shining a Light on Our New Brand
Our new brand is bold and unique. Just like the approach Kasada takes to stopping automated threats ... Read More
4 Types of Web Scraping & Why They’re So Difficult to Stop
The most common automated threat we defend our customers against and have observed across the internet is web scraping. It’s even more common than account takeover and carding attacks which are plentiful. Web scraping is so advantageous and profitable that questionable businesses dedicated to it have begun popping up, essentially ... Read More
Spring4Shell Zero-Day Vulnerability: While You’re Waiting for Your WAF
Spring4Shell CVE-2022-22965 A newly disclosed remote code execution vulnerability in Spring Core, a widely used Java framework, has been identified. Exploitation of CVE-2022-22965 has been confirmed as a means of enabling unauthenticated remote code execution on applications. Similar to the recent zero-day vulnerability identified with Log4j CVE-2021-44228, and other events ... Read More
Privacy vs. Security: Is Your Bot Mitigation Solution Effective in the Wake of Web Privacy Trends?
Bad Bots Disguise as Humans to Bypass Detection Bot mitigation providers place significant emphasis on stopping bots with the highest degree of accuracy. After all, it only takes a small number of bad bots to get through your defenses to wreak havoc on your online businesses. One challenge of stopping ... Read More