The Rise & Fall of Single Request Bots

The cat and mouse game between bot operators executing automated attacks and prevention vendors has become increasingly sophisticated, with each side applying more intelligence to their respective prevention or malicious efforts. Prevention ...
CQ botDefense 5 Minute Demo

Disney+ Account Takeovers: How the Information is Used

I recently joined Cequence as a Hacker in Residence and am excited to focus on the world of automated attacks and how BOTs are used for things like account take over and ...
CQ botDefense 5 Minute Demo

Tales from the Front Lines: Protecting Financial Services Mobile Application APIs From Automated Attacks

Next week we will be at FS-ISAC in Washington DC (booth #60) to present (Monday, Nov. 18, 4:15PM-5:00PM) and talk with financial services organizations about how we can help them prevent fraud ...
bots

Why Organizations are Failing to Deal With Rising Bot Attacks

The need for bot management is fueled by the rise in automated attacks. In the early days, the use of bots was limited to small scraping attempts or spamming. Today, things are ...
Security Boulevard
CQ botDefense 5 Minute Demo

Tales from the Front Lines: A Long Weekend Ruined for Whom?

Automated bot attacks are a bit different than other types of cyber-attacks in several ways. First, these attacks are difficult to defend against because they appear to be legitimate uses of the ...

Here’s Why Online Holiday Inventory is Often Gone Before You Get There

As the holidays draw nearer and consumers begin frequenting their favorite online retailers in search of the perfect gift, it seems an appropriate time to put the spotlight on a topic that ...
CQ botDefense 5 Minute Demo

API Security Podcast: How APIs Enable Digital Transformation and Automated Attacks

It’s no secret that APIs are an invaluable tool for application developers who are tasked with doing more with less. In this Aite Radio Podcast, Alissa Knight and Shreyans Mehta, Co-founder and ...
How Cequence Security Protects Zoosk from Automated Bot Attacks

How Zoosk Detects and Mitigates Malicious Bots

A leader in online dating, Zoosk is committed to delivering personalized matches to its 35+ million members. With the ultimate goal of creating lasting and meaningful relationships, protecting their users from fraud ...
CQ botDefense 5 Minute Demo

Prying-Eye Vulnerability: Direct-to-API Enumeration Attack Enables Snooping

The Prying-Eye vulnerability is an example of an enumeration attack that targets web conferencing APIs with a bot that cycles through (enumerates) and discovers valid numeric meeting IDs. If the common user ...
Another Day, Another Data Breach

Another Day, Another Data Breach

The bleeding of private data never seems to stop. This week, StockX announced that 6.8 million records were exposed. Last week it was CapitalOne announcing a significant data breach of over 100 ...