automated attacks
Tales from the Front Lines: Attackers Target APIs with GET-Based ATOs
This blog will describe how account takeovers (ATO) can be executed against APIs using GET methods, as opposed to POST. It’s an excellent example of how bad actors will analyze an application ...
New Survey Highlights Need for API Visibility
There’s an old saying “you don’t know what you don’t know.” While there are many ways that we can go about filling the gaps in our knowledge – more reading and education, ...
Automated Attacks Call for Automated Protection – 2020 Trend #3
In our blog series on security trends, we’ve been diving deeper into the five security predictions for 2020 made by our CTO Kunal Anand during his fireside chat with Imperva CMO David ...
The War No One is Talking About
There is a war brewing in cyberspace. The general public is blissfully unaware, and very likely will remain so. The media, when it talks about cybersecurity, tends to focus on the breach ...
The Changing Landscape of Automated Attacks on Web and Mobile Apps
In recent years, we have witnessed an unprecedented surge in automated attacks targeting online businesses. These attacks are aimed at validating stolen payment card details, scraping content, taking over accounts and sometimes ...
How Starbucks Combats Account Takeover (ATO)
Account Takeovers (ATOs) and credential stuffing represent a huge threat to the retail industry. In fact, they pose major problems for any vertical in which customers tend to reuse passwords for multiple ...
How Cybercriminals Monetize E-Commerce Fraud
E-commerce fraud has grown to the point where it’s a now a bigger drain on retail profits than shoplifting or inventory shrinkage. Based on the information we’ve gathered defending many of the ...
World Password Day keeps coming and going, but password reuse sticks around
Password reuse allows fraudsters to use credentials stolen on one website to take over accounts on other sites. It’s World Password Day again, the day created to herald the guardians of our ...
Complying with NIST Guidelines for Stolen Passwords
It seems everyone today is talking about stolen passwords, but this is an older problem than people realize. Protecting your enterprise from credential stuffing attacks and account takeover as a result of ...

