bot attacks
Moving from Threat Hunting to Threat Catching
The goal of a Threat Hunter is to find an attacker in the middle of an attack before they can cause damage. This entails hunting through thousands of requests trying to pick ...
Tales from the Front Lines: Large Retailer Achieves Near Immediate Time-to-Value
One of our newest customers is a large, community-based retailer that had a mobile application and API account takeover problem. Roughly 12 months ago, they selected a JavaScript and SDK-based bot mitigation ...
An Alternative Approach to WAAP Architecture
Over the last few months, I’ve had many conversations with customers about securing their APIs and some common challenges they face. Many of them already have revenue-generating applications consumed by their customers ...
Get Ready— It’s Almost Bots Attack Week!
All next week, experts from Cequence Security will be sharing key threat research findings and best-practice recommendations for protecting your organization from threats such as API abuse, account takeovers, fake account creation ...
Tales from the Front Lines: Maintaining Detection Efficacy (and Your Cool) in the Summer Heat
In a previous blog, I talked about how the Covid-19 pandemic lockdown had corresponded to an increase in attack intensity. Since then, different parts of the country have begun to reopen, and ...
Are Businesses Unprepared to Fight Bot Attacks?
Businesses know bots present a big threat to their security and sensitive data. But they’re not doing nearly enough to mitigate the problem, according to new research from Netacea, which looked at ...
Help! There’s an OpenBullet Attack Config for Our Site – What Should we Do?
Thinly veiled as a web testing tool, OpenBullet a commonly used attack management toolkit that allows a bad actor to create and execute automated account takeovers and other types of attacks. Complete ...
Kasa Camera Vulnerability Discovery: Responsible Disclosures Feel Like Groundhog Day, Again
When APIs Say Too Much As a Midwesterner and hobby farmer I spend a lot of time solving problems. A few months ago I encountered a problem where a live 2-month-old cucumber ...
Looking for a Silver Tail Replacement?
When RSA Security announced end-of-life (EOL) for Silver Tail, a popular fraud prevention product, they left a lot of customers scrambling to find an alternative. If you find yourself looking for a ...
Tales from the Front Lines: Attackers Target APIs with GET-Based ATOs
This blog will describe how account takeovers (ATO) can be executed against APIs using GET methods, as opposed to POST. It’s an excellent example of how bad actors will analyze an application ...

