State of API Security Activity
A recap of API threat statistics and unique threat patterns observed by the Cequence CQ Prime Threat Research Team. Summary of Key Findings Unusual uptick in traffic from China spiking at a 200% increase User-experience business logic was abused to commit fraudulent purchases on stolen cards Pop in traffic from ... Read More
State of API Security Activity
A recap of API threat statistics and unique threat patterns observed by the Cequence CQ Prime Threat Research Team. Summary of Key Findings Unusual uptick in traffic from China spiking at a 200% increase User-experience business logic was abused to commit fraudulent purchases on stolen cards Pop in traffic from ... Read More
Threat Advisory: New Log4j Exploit Demonstrates a Hidden Blind Spot in the Global Digital Supply Chain
While helping our customers validate their patching efforts, the CQ Prime Threat Research team found additional unpatched servers with the Log4j vulnerability hidden within their digital supply chain, dubbed LoNg4j. The Risks The Log4j vulnerability is more widespread than we thought, spread across the digital software supply chain. Testing reveals ... Read More
Threat Advisory: New Log4j Exploit Demonstrates a Hidden Blind Spot in the Global Digital Supply Chain
While helping our customers validate their patching efforts, the CQ Prime Threat Research team found additional unpatched servers with the Log4j vulnerability hidden within their digital supply chain, dubbed LoNg4j. The Risks The Log4j vulnerability is more widespread than we thought, spread across the digital software supply chain. Testing reveals ... Read More
How Shadow APIs Simplify Automated Attacks
The term shadow API can convey a sense of a complicated, nebulous object, which doesn’t necessarily convey the security risks when they are discovered in the wild. The reason attacks on shadow APIs are so effective is that they exploit seemingly innocuous mistakes in development and asset management control. These ... Read More
Threat Advisory: Recent High Volume Bot Traffic from IPVanish VPN Against Retailers
TL;DR A spike in malicious bot traffic with similar characteristics across more than 20 customers emanating from the same VPN vendor and its affiliated companies. Between July 21st and August 4th, average daily bot traffic from IP addresses owned by IPVanish, Highwinds Network Group, StackPath Data Center, Netprotect, Reliable Hosting, ... Read More
Here’s Why JavaScript-Based Bot Detection Doesn’t Work. Is Your Site Listed Here?
We’ve been working with a client who was getting hit with wave after wave of bot attacks that were easily bypassing their JavaScript-based Bot Detection tools. It seemed odd that they had such a wide array of attackers, and started researching if there were some new attack configs for sale ... Read More