The goal of a Threat Hunter is to find an attacker in the middle of an attack before they can…
One of our newest customers is a large, community-based retailer that had a mobile application and API account takeover problem.…
Over the last few months, I’ve had many conversations with customers about securing their APIs and some common challenges they…
All next week, experts from Cequence Security will be sharing key threat research findings and best-practice recommendations for protecting your…
In a previous blog, I talked about how the Covid-19 pandemic lockdown had corresponded to an increase in attack intensity.…
Businesses know bots present a big threat to their security and sensitive data. But they’re not doing nearly enough to…
Thinly veiled as a web testing tool, OpenBullet a commonly used attack management toolkit that allows a bad actor to…
When APIs Say Too Much As a Midwesterner and hobby farmer I spend a lot of time solving problems. A…
When RSA Security announced end-of-life (EOL) for Silver Tail, a popular fraud prevention product, they left a lot of customers…
This blog will describe how account takeovers (ATO) can be executed against APIs using GET methods, as opposed to POST.…