Tag: bots
How We Were Able to Help Our Customers With the Log4j 0Day
Many security teams are still working overtime to patch and protect against any log4j-related...
VIEW MOREAccount Takeover (ATO): Types, Detection, Prevention and Protection
In the previous installment of our blog series on the modern threat landscape, we looked at how...
VIEW MORELog4j2: What We’ve Seen, What We Expect
We’re about a week and a half into the release of the Log4j2 vulnerability,...
VIEW MOREGrinch Bots Wreaking Havoc This Holiday Season
We’re right in the midst of the biggest online shopping days of the year. Add...
VIEW MOREWhy Signature-Based Detection Struggles to Keep Up With the New Attack Landscape
Change is an inherent part of cybersecurity as attackers constantly look for new ways to evade and...
VIEW MORECredential Stuffing, DDoS Attacks, Bots, and More Create a Formidable Iceberg of Risk
Sometimes you see a threat coming and have time to prepare – like a forecasted hurricane....
VIEW MOREHow to Overcome Credit Union Cybersecurity Challenges
Credit unions have a unique set of cybersecurity challenges stemming from their size, mission, and...
VIEW MORENew Research: Bot and DDoS Attacks on the Rise
Cybersecurity is changing fast. Just glance at the breach headlines, and you’ll most certainly...
VIEW MOREWhat Are Bad Bots, and How to Stop Them
With up to 50 percent of Internet traffic generated by bots, organizations are awash in a sea of...
VIEW MORETop 4 Malicious Automation Attacks & How to Detect Them
We first introduced malicious automation in Part I of this blog series. We shared how malicious...
VIEW MOREMalicious Bot Detection Through A Complex Proxy Network
A malicious entity operating a botnet to execute credential stuffing or password spraying attacks...
VIEW MOREEnhanced Edge Caching, Site Profiling, and Bot Capabilities
Based on analysis of existing data, feedback from customers, and thought leadership insights,...
VIEW MORE