
Shining a Light on Our New Brand
Our new brand is bold and unique. Just like the approach Kasada takes to stopping automated threats ... Read More

4 Types of Web Scraping & Why They’re So Difficult to Stop
The most common automated threat we defend our customers against and have observed across the internet is web scraping. It’s even more common than account takeover and carding attacks which are plentiful. Web scraping is so advantageous and profitable that questionable businesses dedicated to it have begun popping up, essentially ... Read More

Spring4Shell Zero-Day Vulnerability: While You’re Waiting for Your WAF
Spring4Shell CVE-2022-22965 A newly disclosed remote code execution vulnerability in Spring Core, a widely used Java framework, has been identified. Exploitation of CVE-2022-22965 has been confirmed as a means of enabling unauthenticated remote code execution on applications. Similar to the recent zero-day vulnerability identified with Log4j CVE-2021-44228, and other events ... Read More

Privacy vs. Security: Is Your Bot Mitigation Solution Effective in the Wake of Web Privacy Trends?
Bad Bots Disguise as Humans to Bypass Detection Bot mitigation providers place significant emphasis on stopping bots with the highest degree of accuracy. After all, it only takes a small number of bad bots to get through your defenses to wreak havoc on your online businesses. One challenge of stopping ... Read More

Cyber Five 2021: Kasada’s Bad Bot eCommerce Holiday Insights
Headaches for the holidays… thanks to Grinch Bots Kasada’s Threat Intelligence Team has prepared key insights observed within Kasada’s eCommerce traffic this holiday season. To no one’s surprise, bots are on the naughty list again this holiday season. We’ve observed a 10x increase in malicious login attempts during the period ... Read More

WAF Rules? Where We’re Going, We Don’t Need Rules – Reimagining Web Application Security
Traditional Bot Management grew out of Web Application Firewalls Web Application Firewalls (WAFs) were one of the first tools available to protect web applications, including the vulnerabilities and risks considered the most critical, inclusive but not limited to the OWASP Top Ten web application security risks. As the primary tool ... Read More

WAF Rules? Where We’re Going, We Don’t Need Rules – Reimagining Web Application Security
Traditional Bot Management grew out of Web Application Firewalls Web Application Firewalls (WAFs) were one of the first tools available to protect web applications, including the vulnerabilities and risks considered the most critical, inclusive but not limited to the OWASP Top Ten web application security risks. As the primary tool ... Read More

7 Key Findings from the 2021 State of Bot Mitigation Survey
For years there have been surveys reporting on the state of bad bots to demonstrate the increasing sophistication and financial impact malicious bots have on businesses. The result of these studies? Bad bots are bad for business. But we already knew that, didn’t we? We felt it was time to ... Read More

7 Key Findings from the 2021 State of Bot Mitigation Survey
For years there have been surveys reporting on the state of bad bots to demonstrate the increasing sophistication and financial impact malicious bots have on businesses. The result of these studies? Bad bots are bad for business. But we already knew that, didn’t we? We felt it was time to ... Read More

Why It’s So Difficult to Stop “Grinch” Bots
Want a PS5 for Christmas? Good Luck It’s evident that “Grinch” bots have stolen Christmas this year… again. Over the past month, there have been numerous articles about how bots are being used to ruin shopping lists for many boys and girls that have been nice this year. Whether the ... Read More