Tag: attacks
API and App Security: Q4 2023 Snapshot
We recently analyzed data collected on the ThreatX API and Application Protection platform from...
VIEW MORETwo Most Common Brute Force Attacks We See
The ThreatX Protection-as-a-Service team sees a lot of brute force attacks – or attacks that...
VIEW MOREDefending Against Zero-Day Threats
With the dynamic and complex nature of today’s technology landscape, zero-day threats are a...
VIEW MOREThreatX Blocks Millions of Credential Stuffing Attempts Targeting Pet Supply Company
Bot Attackers Are Getting Harder to Detect Botnet attacks are happening more frequently than...
VIEW MOREHow to Identify Distributed Botnet-Based Attacks
Botnet-based attacks like credential stuffing are occurring more often because credentials are...
VIEW MOREDetailed Look at a Real-World Credential Stuffing Event
Credential stuffing attack events are becoming increasingly common against organizations of every...
VIEW MOREThe Evolving MyloBot Botnet
What Is MyloBot? MyloBot is a sophisticated botnet that controls thousands of systems in...
VIEW MOREHow ThreatX Defends Against Multi-Vector API and Application Attacks
We at ThreatX are observing an uptick in multi-vector API and application attacks, or orchestrated...
VIEW MOREAnnouncing ThreatX Labs
I’m happy to announce that ThreatX will be conducting more threat research with the formation of...
VIEW MOREPro-Russian Hacker Group, Killnet, Attacking US Government Sites
As the war between Russia and Ukraine rages on, so do the cyberattacks against Ukraine and its NATO...
VIEW MORELack of Resources and Rate Limiting: What It Is, How We Can Help
NOTE: The 2023 OWASP API Top 10 vulnerabilities list replaced Lack of Resources and Rate Limiting...
VIEW MOREBrute Force Attacks: What They Are, How They Work, How to Prevent Them
While brute force attacks aren’t new, they’re still one of the go-to methods for...
VIEW MORE