CQAI

Moving from Threat Hunting to Threat Catching

The goal of a Threat Hunter is to find an attacker in the middle of an attack before they can…

4 days ago

Tales from the Front Lines: How Third-Party APIs Simplify Enumeration Attacks

As a mechanism to offload PCI risks, many retailers are now using third-party credit card processing for their online transactions.…

1 month ago

Tales from the Front Lines: Maintaining Detection Efficacy (and Your Cool) in the Summer Heat

In a previous blog, I talked about how the Covid-19 pandemic lockdown had corresponded to an increase in attack intensity.…

4 months ago

Creating Credential Stuffing Resistant Applications

Recently, the amount of coverage on credential stuffing attacks in the news has grown. Organizations that haven’t yet been hit…

8 months ago