Threat Research

How DataDome Defended a Marketplace with 90 Million Users from Flash DDoS Attacks
A leading online marketplace with 90M+ users faced two Flash DDoS attacks. See how DataDome blocked them in milliseconds at the edge, ensuring zero disruption ...

Fake e-Shop scams — How cybercriminals are cashing it in
Our researchers first detected a surge in fake e-shop scams preying on bargain-hunting consumers during Black Friday and Christmas shopping sprees. However, just because the holiday season ended, doesn’t mean that shoppers ...

Securing OAuth Authentication Risks with AI-Driven Monitoring
As organizations continue to integrate cloud-based services and third-party applications, OAuth authentication has become a cornerstone of modern security frameworks. However, recent cybersecurity incidents highlight a growing concern: OAuth-based vulnerabilities remain an ...

Why DeepSeek’s Low Price Could Cost You Everything
While its capabilities are impressive, this development raises significant concerns about the hidden costs and potential security risks associated with its widespread adoption ...

Malicious ML models discovered on Hugging Face platform
In the last few months, artificial intelligence (AI) is popping up in all kinds of headlines, ranging from technical software developer websites to the Sunday comics. There’s no secret why. Given the ...

Advanced Threat Management: Revolutionizing Cybersecurity with AI-Driven Monitoring and Detection Systems
Today, the need for robust threat management has never been more critical. As cyber threats become increasingly sophisticated, organizations must leverage cutting-edge technologies to avoid potential attacks. This blog post explores how ...

What is Threat Detection and Response (TDR)?
According to recent data, the threat detection and response (TDR) market is experiencing significant growth. The global identity threat detection and response (ITDR) market is projected to reach $35.6 billion by 2029 ...
Super Bowl Betting Under Attack: Weak Security Puts Users & Winnings at Risk
As the Super Bowl approaches, betting websites are experiencing a surge in traffic, attracting not just enthusiastic bettors but also malicious actors looking to exploit security gaps ...

Mastering Threat Detection Tools and Threat Identification: A Cybersecurity Guide
Organizations face unprecedented cyber threats in the rapidly evolving digital landscape. As attack vectors become more sophisticated and diverse, the need for advanced threat detection tools and robust threat identification capabilities ...

Codefinger Ransomware: Detection and Mitigation Using MixMode
The Codefinger ransomware represents a new frontier in cyber threats, specifically targeting AWS S3 buckets. By exploiting Server-Side Encryption with Customer-Provided Keys (SSE-C), attackers gain control over the encryption process, rendering recovery ...