Bot Defense
Moving from Threat Hunting to Threat Catching
The goal of a Threat Hunter is to find an attacker in the middle of an attack before they can cause damage. This entails hunting through thousands of requests trying to pick ...
Tales from the Front Lines: Large Retailer Achieves Near Immediate Time-to-Value
One of our newest customers is a large, community-based retailer that had a mobile application and API account takeover problem. Roughly 12 months ago, they selected a JavaScript and SDK-based bot mitigation ...
Get Ready— It’s Almost Bots Attack Week!
All next week, experts from Cequence Security will be sharing key threat research findings and best-practice recommendations for protecting your organization from threats such as API abuse, account takeovers, fake account creation ...
Tales from the Front Lines: Maintaining Detection Efficacy (and Your Cool) in the Summer Heat
In a previous blog, I talked about how the Covid-19 pandemic lockdown had corresponded to an increase in attack intensity. Since then, different parts of the country have begun to reopen, and ...
Help! There’s an OpenBullet Attack Config for Our Site – What Should we Do?
Thinly veiled as a web testing tool, OpenBullet a commonly used attack management toolkit that allows a bad actor to create and execute automated account takeovers and other types of attacks. Complete ...
Looking for a Silver Tail Replacement?
When RSA Security announced end-of-life (EOL) for Silver Tail, a popular fraud prevention product, they left a lot of customers scrambling to find an alternative. If you find yourself looking for a ...
Tales from the Front Lines: Attackers Target APIs with GET-Based ATOs
This blog will describe how account takeovers (ATO) can be executed against APIs using GET methods, as opposed to POST. It’s an excellent example of how bad actors will analyze an application ...
Tales from the Frontlines: Increasingly Sophisticated Cat and Mouse Games
The last Tales from the Frontlines post focused on a single customer and the attack volume increase they experienced following the COVID-19 lockdown. In this installment, we will look at the increasingly ...
Tales from the Front Lines: Why Simple Attacks Like Content Scraping are the Hardest to Block
Of all of the automated business logic abuse attacks, the simple act of copying and pasting content from one web page to another is the most difficult for any technology to stop ...
Simplifying Bot Prevention with CDN Integration
Nearly every customer we speak with is in the process of executing a cloud migration initiative. In many cases, the cloud means first looking into SaaS as the deployment option for a ...

