The goal of a Threat Hunter is to find an attacker in the middle of an attack before they can…
One of our newest customers is a large, community-based retailer that had a mobile application and API account takeover problem.…
All next week, experts from Cequence Security will be sharing key threat research findings and best-practice recommendations for protecting your…
In a previous blog, I talked about how the Covid-19 pandemic lockdown had corresponded to an increase in attack intensity.…
Thinly veiled as a web testing tool, OpenBullet a commonly used attack management toolkit that allows a bad actor to…
When RSA Security announced end-of-life (EOL) for Silver Tail, a popular fraud prevention product, they left a lot of customers…
This blog will describe how account takeovers (ATO) can be executed against APIs using GET methods, as opposed to POST.…
The last Tales from the Frontlines post focused on a single customer and the attack volume increase they experienced following…
Of all of the automated business logic abuse attacks, the simple act of copying and pasting content from one web…
Nearly every customer we speak with is in the process of executing a cloud migration initiative. In many cases, the…