How Bots and AI Are Fueling Disinformation

| | Cybersecurity
Disinformation is hardly new, yet its impact is undeniably amplified in the digital age. AI-enabled bots are amplifying the noise ... Read More
A pie chart showing the true Total Cost of Ownership of an anti-bot solution three segments: 37% for "The anti-bot solution itself", 29% for "Post-event remediation", and 34% for "Ongoing management and maintenance".

5 Key Findings from the 2024 State of Bot Mitigation Survey

| | Cybersecurity
The 4th annual survey exclusively from the perspective of technology professionals who are already using anti-bot solutions at their companies ... Read More
Line graph titled "AI Data Scraping Requests" showing daily requests on a logarithmic scale over time from April to June 2024. Lines for Unauthorized AI Data Scraping by Anthropic (blue), Bytespider (red), and OpenAI (yellow) are displayed.

No Trespassing: Challenges In Stopping Unauthorized AI Data Scraping

| | Cybersecurity
Data scrapers used to train LLMs can be evasive. Here's our recent view of AI data scraping attempts against Kasada customers ... Read More
An image of Aruba's sandy beach with clear turquoise water, bordered by rocky outcrops and lush green trees under a partly cloudy sky. Palm trees are visible in the distance.

I purchased a luxury vacation to Aruba for only $151.73 – thanks to credential stuffing

Travel accounts are attractive targets for fraudsters. Once access is gained, they can easily book vacations, transfer points, or sell accounts on the dark web ... Read More
Line graph showing 'requests by classification' over time with 'human' requests in blue, consistently low, and 'AI data poisoning' requests in red, showing frequent spikes.

AI Data Poisoning: How Misleading Data Is Evading Cybersecurity Protections

Discover why AI data poisoning is an emerging threat and how fake data is used to evade AI cybersecurity protections ... Read More

Kasada Achieves AWS Retail Competency and is Now Available in Marketplace

| | In The News
Makes it easy to buy, integrate, and realize immediate value when using Kasada and AWS edge security services together ... Read More
Kasada logo mark

Shining a Light on Our New Brand

| | Cybersecurity
Our new brand is bold and unique. Just like the approach Kasada takes to stopping automated threats ... Read More
4 Types of Web Scraping & Why They’re So Difficult to Stop 

4 Types of Web Scraping & Why They’re So Difficult to Stop 

| | Industry Trends
The most common automated threat we defend our customers against and have observed across the internet is web scraping. It’s even more common than account takeover and carding attacks which are plentiful. Web scraping is so advantageous and profitable that questionable businesses dedicated to it have begun popping up, essentially ... Read More
Spring4Shell Zero-Day Vulnerability: While You’re Waiting for Your WAF

Spring4Shell Zero-Day Vulnerability: While You’re Waiting for Your WAF

| | Industry Trends, Product
Spring4Shell CVE-2022-22965 A newly disclosed remote code execution vulnerability in Spring Core, a widely used Java framework, has been identified. Exploitation of CVE-2022-22965 has been confirmed as a means of enabling unauthenticated remote code execution on applications. Similar to the recent zero-day vulnerability identified with Log4j CVE-2021-44228, and other events ... Read More
Privacy vs. Security: Is Your Bot Mitigation Solution Effective in the Wake of Web Privacy Trends?

Privacy vs. Security: Is Your Bot Mitigation Solution Effective in the Wake of Web Privacy Trends?

| | Industry Trends
Bad Bots Disguise as Humans to Bypass Detection Bot mitigation providers place significant emphasis on stopping bots with the highest degree of accuracy. After all, it only takes a small number of bad bots to get through your defenses to wreak havoc on your online businesses. One challenge of stopping ... Read More