Security Trends

Do You Need a WAF, or Something Better than a WAF?

“The king is dead! Long live the king!” The jarring conflict embodied in this timeless hoorah is about to apply…

2 years ago

What your login success rate says about your threat surface

One of the problems with imitation attacks such as sophisticated credential stuffing is that they are designed to blend in…

2 years ago

5 Rando Stats from Watching eCrime All Day Every Day

David Holmes here, cub reporter for Shape Security. While I’m luxuriating in United Airlines steerage class, our crack SOC team…

2 years ago

Extreme Cybersecurity Predictions for 2019

Prediction blogs are fun but also kind of dangerous because we’re putting in writing educated guesses that may never come…

2 years ago

Reverse Engineering JS by example

flatmap-stream payload A In November, the npm package event-stream was exploited via a malicious dependency, flatmap-stream. The whole ordeal was…

2 years ago

The Best of Shape Security 2018

Focus on the Good Things There are already too many blogs focusing on the bad things that happened this year.…

2 years ago

2018 in Review: The Top Four Takeaways in Security

Our last blog of 2018 takes a closer look at four critical security developments and trends … and how we…

2 years ago

Better Together: Partnering with Okta

Every day, nearly 10 million valid credentials fall into the hands of criminals, fueling massive amounts of fraud. Shape’s new…

2 years ago

Shape Honored As Fastest Growing Company in Silicon Valley by Deloitte’s 2018 Technology Fast 500

Today Shape was recognized as the fastest-growing company in Silicon Valley and the third-fastest growing company in the U.S. by…

2 years ago

Key Findings from the 2018 Credential Spill Report

In 2016 we saw the world come to grips with the fact that data breaches are almost a matter of…

2 years ago