bot attack

Bolstering API Security and Bot Attack Protection with NSFOCUS Next-Generation WAF
NSFOCUS’s Next-Generation WAF addresses various threats faced by users, such as web vulnerability exploitation, resource abuse, and resource access control. It provides a comprehensive solution that includes traditional WAF functionality, bot traffic ...

IBM Extends Cloudflare Alliance to Combat Bots Using Machine Learning
IBM extends its alliance with Cloudflare to combat malicious bot attacks growing in volume and sophistication ...
Radware Bot Manager Protects Africa’s Largest Drugstore and Grocery Chain From Damaging Bot Attacks
A Radware Cloud Workload Protection client that is one of the largest drugstore and grocery chains in Africa turned to Radware’s cybersecurity experts to help mitigate and prevent bot attacks that were ...

Tales From the Front Lines: New Applications Protected in Just 33 Minutes
In this week’s blog, we will talk about two recent customer scenarios where the value of our no JavaScript or SDK approach became evident in minutes: when customers needed to prevent an ...

When “Good Enough” Bot Protection Negatively Impacts the Bottom Line
Lending support to the business impact of bots we discussed in a webinar a few weeks ago, Google has released the results of a survey performed by Forrester, further quantifying the true ...
Tales From the Front Lines: Retail Customer Stops $200k Gift Card Fraud Scheme
Our standard customer engagement process is to deploy Bot Defense into a customer environment to prove our value. We are often deployed alongside an existing general-purpose bot mitigation solution, with the customer ...
Technology & Collaboration: The Winning Formula to Defeat Shopping Bots
As an innovator, software is always the first thing I think about when addressing a problem. But, in a recent blog about shopping bots and the holiday season, Sandy Carielli at Forrester ...

Get Ready— It’s Almost Bots Attack Week!
All next week, experts from Cequence Security will be sharing key threat research findings and best-practice recommendations for protecting your organization from threats such as API abuse, account takeovers, fake account creation ...

Help! There’s an OpenBullet Attack Config for Our Site – What Should we Do?
Thinly veiled as a web testing tool, OpenBullet a commonly used attack management toolkit that allows a bad actor to create and execute automated account takeovers and other types of attacks. Complete ...