bot attacks

Moving from Threat Hunting to Threat Catching

The goal of a Threat Hunter is to find an attacker in the middle of an attack before they can…

4 days ago

Tales from the Front Lines: Large Retailer Achieves Near Immediate Time-to-Value

One of our newest customers is a large, community-based retailer that had a mobile application and API account takeover problem.…

4 weeks ago

An Alternative Approach to WAAP Architecture

Over the last few months, I’ve had many conversations with customers about securing their APIs and some common challenges they…

2 months ago

Get Ready— It’s Almost Bots Attack Week!

All next week, experts from Cequence Security will be sharing key threat research findings and best-practice recommendations for protecting your…

3 months ago

Tales from the Front Lines: Maintaining Detection Efficacy (and Your Cool) in the Summer Heat

In a previous blog, I talked about how the Covid-19 pandemic lockdown had corresponded to an increase in attack intensity.…

4 months ago

Are Businesses Unprepared to Fight Bot Attacks?

Businesses know bots present a big threat to their security and sensitive data. But they’re not doing nearly enough to…

5 months ago

Help! There’s an OpenBullet Attack Config for Our Site – What Should we Do?

Thinly veiled as a web testing tool, OpenBullet a commonly used attack management toolkit that allows a bad actor to…

5 months ago

Kasa Camera Vulnerability Discovery: Responsible Disclosures Feel Like Groundhog Day, Again

When APIs Say Too Much As a Midwesterner and hobby farmer I spend a lot of time solving problems. A…

5 months ago

Looking for a Silver Tail Replacement?

When RSA Security announced end-of-life (EOL) for Silver Tail, a popular fraud prevention product, they left a lot of customers…

6 months ago

Tales from the Front Lines: Attackers Target APIs with GET-Based ATOs

This blog will describe how account takeovers (ATO) can be executed against APIs using GET methods, as opposed to POST.…

6 months ago