Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Bots

Ask the Experts: Black Friday Bot Attacks

As Black Friday approaches, retailers are gearing up for the inevitable surge in online traffic. But cybercriminals are also preparing for this high-stakes season, fine-tuning their bot attack strategies to exploit inventory, pricing, and customer accounts. To shed light on these threats and what retailers can do to prepare, we consulted five experts from Netacea who shared their insights on the bot attack landscape during Black Friday and beyond.

Evolution of Scalper Bots Part 5: The Rise of Retail Scalping

Welcome back to our Evolution of Scalper Bots series from the Netacea Threat Intel Center. In our previous blog, we reviewed the early days of anti-bot legislation and its limitations, especially around ticket scalping. Traditional defenses like CAPTCHA quickly became insufficient, which spurred the development of bot management solutions.

How Bot Expertise Stopped the Google Translate Bot Proxy Technique

Bot attacks are evolving to become more sophisticated. Attackers have built businesses around the data and assets they extract with bots, so they constantly seek ways to bypass defenses. Developers work tirelessly to assess bot defenses and find new methods to evade them. Traditional, client-side defenses are visible to attackers, making it easier for them to bypass. But even advanced defenses must stay alert, embedding bot expertise to keep pace with these evolving tactics.

The Botnet is Back: SSC STRIKE Team Uncovers a Renewed Cyber Threat

A silent danger is sweeping through the world’s critical infrastructure. The SecurityScorecard STRIKE Team has uncovered a resurgence of Volt Typhoon—a state-sponsored cyber-espionage group from the Asia-Pacific region, known for its precision and persistence. This is no ordinary attack. Volt Typhoon exploits unprotected, outdated edge devices within targeted critical infrastructure.

Evolution of Scalper Bots Part 4: New Bot Tactics vs. Anti-Bot Tools and Legislation

Welcome back to our Evolution of Scalper Bots series. In our last post, we explored how scalper bots expanded into new markets from 2010 to 2014. We saw the scalper bot industry rise and a technological arms race begin between developers and retailers. As we delve into the period of 2015 to 2017, this battle intensifies. Scalper bots become more sophisticated, retailers implement new countermeasures, and legal challenges emerge.

Cybersecurity Sessions S03E03 - Stuart Seymour (Group CISO, Virgin Media O2)

In this insightful episode, Stuart Seymour, Group CISO and CSO at Virgin Media O2, joins Andrew Ash (CISO, Netacea) to discuss how his experience as a British Army Captain shaped his unique leadership style in cybersecurity. Stuart also shares his passion for building diverse, neurodiverse teams, drawing from his own experience with dyslexia. He dives into the growing importance of AI in SOCs and the complex challenges of navigating global cybersecurity regulations. A must-listen for anyone looking to understand the evolving role of a CISO in today's landscape.

Combating Content Theft: Maximize Revenue by Securing Your Content

Content scraping is on the rise. While it can benefit your business in some cases, it can also lead to lost revenue, degraded website performance, and content theft. Web scraping is a hot topic in tech news. This trend links to the rise in AI tools, specifically LLMs (large language models), which rely on content to generate their outputs. They scrape content from across the web to train these algorithms. This is a controversial subject with moral, technical, and legal implications.

Edge Device Botnet Compromise

A recent joint threat advisory from the FBI, CNMF, NSA (18 September 2024), highlights the extent of Chinese-affiliated threat actors’ ongoing botnet campaigns which seek to compromise thousands of internet-connected edge devices over a sustained period. This campaign, known as Oriole, is just one of several such active campaigns observed since 2020. JUMPSEC observations indicate that law enforcement has not yet disrupted the botnet, and indicators of compromise (IOCs) are likely ongoing.