Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Credential Stuffing and ATO: 16 Billion Reasons Brands Are at Risk

Account takeover (ATO) is one of the most consistent and costly threats facing consumer-facing businesses in 2025. And this year, the problem has been supercharged by the Mother of All Breaches (MOAB), a credential leak containing 16 billion username and password combinations. It rarely begins with a breach of your own systems. More often, it starts with someone else’s data leak. Credentials are reused, recompiled, and redeployed across platforms you may not even realise are vulnerable.

Netacea Achieves SOC 2 Compliance for the Fifth Consecutive Year: Why It Matters

We’re proud to announce that Netacea has once again successfully completed our SOC 2 Type II audit, marking our fifth consecutive year achieving this important milestone in data security and trust. SOC 2 compliance isn’t a checkbox exercise. It’s a rigorous, independent validation of how seriously we take the responsibility of protecting customer data. For five years running, Netacea has demonstrated our commitment to operating securely, reliably, and transparently.

How Startups Are Outsourcing Sales to AI Bots

Startups are often very disorganized. They've got big dreams but small wallets. Building a sales team eats up their cash and time. That's where AI bots come in. These tools can close deals, find leads, and work around the clock. Today, startups using AI for sales are outpacing everyone else. This blog breaks down how it works, why it's a game-changer, and how you can jump in.

Stolen by the Scrapers: How to Protect and Profit from Your Content in the Age of AI

What is LLM Scraping? We’re entering a new phase of the Internet, one that is increasingly shaped by generative AI. These systems need data, and lots of it. To meet this hunger, they scrape the web, pulling in everything from news articles and academic journals to product listings, metadata, and user-generated content. This practice, known as large language model (LLM) scraping, has moved far beyond traditional bots indexing public sites.

Inside the Botnet Economy: Building, Selling, and Using Compromised Devices for Cyberfraud at Scale

Botnets have become a core part of the infrastructure in today’s cybercrime ecosystem — not just as enablers of disruption, but as purpose-built networks engineered for profit, stealth, and scalability. Built from large networks of compromised devices and rented out via criminal marketplaces, botnets are now essential as-a-service components of any cyberfraudster’s toolkit. While the concept of a botnet is not new, their construction, use cases, and value have certainly advanced.

The Cyberfraud Economy: 1 in 4 Consumers Tempted by 'Refund Hacks'

Retail fraud is becoming increasingly normalized in the US and UK as ‘refund hacks’ are promoted to consumers by organized crime gangs looking to recruit both knowing and unwitting digital mules. This positioning of fraudulent activity as a ‘refund hack’ deliberately hides its illegal nature. Combined with growing awareness of fraud techniques – both online and offline – it’s driving consumer acceptance of casual fraud. This is bad news for retailers.

OWASP Announces BLADE Business Logic Attack Framework to Give Enterprises Better Tools to Fight Sophisticated Bots

Update to attack framework announced to coincide with recognition as an industry standard The Open Worldwide Application Security Project (OWASP) announced today that the Business Logic Attack Definition Framework (BLADE Framework) has become The OWASP BLADE Framework Project. The name change reflects the acceptance of the attack framework as an OWASP project and recognition of the framework as an industry standard.

How New Bot Detection Tools are Using Behavior Analysis to Target Scammers

Not all bots are built equal. Your online life largely relies on friendly, harmless bots that, for example, help power search engines, run social platforms, monitor sites, and much more. However, there are also bad bots out there, built specifically to cause damage and chaos. These online pests include credential stuffing bots designed to take over your user accounts, scraper bots attempting to steal your publicly available information, and scalping bots trying to grab your inventory for resale. It really is a jungle out there.

AI's Content Gold Rush: Who's Getting Paid, Who's Getting Scraped, and How Businesses Can Turn Content into Revenue

The AI boom is creating a new content economy – one where savvy content owners are striking multi-million-dollar licensing deals, while others are being automatically scraped by bots to train AI models for free. It’s impossible not to have noticed the biggest names in AI, including OpenAI, Google, Anthropic, Perplexity and more, at the center of an argument about ethical content scraping.

An early look at cryptographic watermarks for AI-generated content

Generative AI is reshaping many aspects of our lives, from how we work and learn, to how we play and interact. Given that it's Security Week, it's a good time to think about some of the unintended consequences of this information revolution and the role that we play in bringing them about.