Tag: credential stuffing
Two Most Common Brute Force Attacks We See
The ThreatX Protection-as-a-Service team sees a lot of brute force attacks – or attacks that...
VIEW MOREThreatX Blocks Millions of Credential Stuffing Attempts Targeting Pet Supply Company
Bot Attackers Are Getting Harder to Detect Botnet attacks are happening more frequently than...
VIEW MOREHow to Identify Distributed Botnet-Based Attacks
Botnet-based attacks like credential stuffing are occurring more often because credentials are...
VIEW MORECredential Stuffing: Examples, Detection and Impact
Credential stuffing has become one of the most common and significant threats facing organizations...
VIEW MOREDetailed Look at a Real-World Credential Stuffing Event
Credential stuffing attack events are becoming increasingly common against organizations of every...
VIEW MOREAnnouncing ThreatX Labs
I’m happy to announce that ThreatX will be conducting more threat research with the formation of...
VIEW MOREWhat is BOLA – Broken Object Level Authorization?
No. 1 on the 2023 OWASP Top 10 List of Critical API Security Risks, broken object level...
VIEW MOREGet API Protection Best Practices With “The Definitive Guide to API Attack Protection”
In recent months, we’ve been fielding a lot of questions about API security from our prospects...
VIEW MOREHow We Were Able to Help Our Customers With the Log4j 0Day
Many security teams are still working overtime to patch and protect against any log4j-related...
VIEW MOREAccount Takeover (ATO): Types, Detection, Prevention and Protection
In the previous installment of our blog series on the modern threat landscape, we looked at how...
VIEW MOREDid You Read Our Most Popular 2021 Blog Posts?
2021 was a big year for ThreatX. Not to brag, but we more than doubled our employees and customers,...
VIEW MOREGrinch Bots Wreaking Havoc This Holiday Season
We’re right in the midst of the biggest online shopping days of the year. Add...
VIEW MORE