Threat Advisory: Recent High Volume Bot Traffic from IPVanish VPN Against Retailers

Threat Advisory: Recent High Volume Bot Traffic from IPVanish VPN Against Retailers

TL;DR A spike in malicious bot traffic with similar characteristics across more than 20 customers emanating from the same VPN vendor and its affiliated companies. Between July 21st and August 4th, average ...

Top 7 Selection Criteria for Automated Bot Prevention Solutions

How to Ensure Long-Term Protection Against Today’s Evolving Automated Attacks Today, bots are becoming more than just a security threat. Their contributions to very real lost revenue and customer dissatisfaction are now ...
Fraudulent traffic (red) vs. legitimate traffic (green) over the course of a six-day evolving attack on a retail company

Mitigating sophisticated attacks — the NuData way (part II)

It’s getting harder to tell humans and robots apart. Mitigating sophisticated attacks is possible, but requires behavioral defenses. Read on. The post Mitigating sophisticated attacks — the NuData way (part II) appeared ...
Mitigating sophisticated attacks — the NuData way (part I)

Mitigating sophisticated attacks — the NuData way (part I)

It’s getting harder to tell humans and robots apart. Mitigating sophisticated attacks is possible, but requires behavioral defenses. Read on. The post Mitigating sophisticated attacks — the NuData way (part I) appeared ...
Gmail Farming and Credential Validation

Gmail Farming and Credential Validation

Even after 20 years in the security field, and nearly two years here at Cequence I am continually surprised at how ever-evolving bots impact our customers. It definitely keeps us on our ...

Tales from the Front Lines: Attackers Target APIs with GET-Based ATOs 

This blog will describe how account takeovers (ATO) can be executed against APIs using GET methods, as opposed to POST. It’s an excellent example of how bad actors will analyze an application ...

New Survey Highlights Need for API Visibility

There’s an old saying “you don’t know what you don’t know.” While there are many ways that we can go about filling the gaps in our knowledge – more reading and education, ...

Automated Attacks Call for Automated Protection – 2020 Trend #3

In our blog series on security trends, we’ve been diving deeper into the five security predictions for 2020 made by our CTO Kunal Anand during his fireside chat with Imperva CMO David ...

The War No One is Talking About

There is a war brewing in cyberspace. The general public is blissfully unaware, and very likely will remain so. The media, when it talks about cybersecurity, tends to focus on the breach ...
certificate Menlo states cyber

The Changing Landscape of Automated Attacks on Web and Mobile Apps

In recent years, we have witnessed an unprecedented surge in automated attacks targeting online businesses. These attacks are aimed at validating stolen payment card details, scraping content, taking over accounts and sometimes ...
Security Boulevard

Secure Guardrails