Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Netacea index identifies top five scalper bot targets: Graphics cards, sneakers lead list

New quarterly report reveals most in-demand goods bought for resale using automated bots Manchester, UK – 28th September 2021 – Netacea, the bot detection and mitigation specialist, today launches its Top Five Scalper Bots Quarterly Index, a list of leading items targeted by scalper bots globally. This first index covers April to June 2021 and shows a mix of technology and fashion as the most frequently targeting items by scalper bots.

Are Bots Threatening Travel in 2021? | On-demand Webinar

The last 12 months have seen the travel industry shut down almost completely as borders were closed, and the global population was brought to a standstill, locked in their own homes. As the industry looks to reopen over the coming months, cybersecurity must be a high priority in the hospitality and travel industry, as bots look to disrupt hotel bookings, staycations and international travel.

The biggest threats to your brand in 2021

Last year saw an unprecedented scale of cyber-attacks and data breaches facilitated and accelerated by Covid-19, from scalper bots targeting the PS5 launch to Twitter’s high-profile hack in July. Cybercriminals are upping the ante to capitalise on increased online activity, and automated technology is set to play a huge part in the defence against bot attacks in 2021.

The rising bot threat to media, marketplaces and video gaming

Over recent years, botnet attacks have hit platforms hard with their mass destruction approach to cyber-attacks. However, the tide has turned, and automated bot technology now makes targeted attacks infinitely quicker and simpler to carry out, exposing online gaming and streaming businesses to greater threats. The challenge lies in accurately identifying these highly targeted automated bot attacks that are designed to hide in plain sight, masquerading as genuine users, before they can carry out malicious activity such as credential stuffing, fake account creation and scraping.