Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Netacea

Russian Carding Landscape: Inside Russian Carding Fraud Part 2

In part one of this four-part series on card cracking fraud, we covered the basics of what carding is, how carders use bots to power their attacks, and defined the most important terms and phrases within the carding vocabulary in our Carder’s Dictionary. Click here if you missed it or need a recap. In part two, we’ll be talking more specifically about the carding landscape in Russia and on Russian-speaking forums and online communities.

What is Carding? Inside Russian Carding Fraud: Part 1

Carding fraud is a financially devastating attack made more damaging by bot-based automation that allows it to run at scale. Russian cybercriminals are especially prolific in the carding space. The Netacea threat research team recently conducted an in-depth investigation into this notorious carding fraud ecosystem.

How to Map Your Bot Use Cases and Protect Your Brand

Bots are ubiquitous across the web. If your business has an online presence, it’s being targeted by automated attacks. So, it’s unsurprising to us at Netacea that in the Gartner Hype Cycle for Application Security 2023, bot management is classed as an early mainstream technology – less than two years from reaching full maturity. The nature and purpose of bot attacks depends on many factors including industry, seasonality, and even the functionality of the target.

Cybersecurity Sessions S02E04: National Risk Register, Encrypted Messaging, Residential Proxies

This month we begin by examining the 2023 National Risk Register, a public version of the National Security Risk Assessment, which assesses the most serious risks to lives, health, society, critical infrastructure, economy and sovereignty. Cyber-attacks on infrastructure are listed as moderate impact – Our panel discusses how businesses can use the information within the report to prepare for attacks and keep our critical infrastructure as secure as possible.

Why Security Teams Are Adopting Bot Management At Pace

Businesses are realizing the value of bot management tools as part of their application security strategy, with the control set expected to mature towards mainstream adoption in less than two years. This is according to the latest Hype Cycle™ for Application Security by Gartner®, released this month.

Why Taylor Swift Fans Got Blocked For Being Bots

Taylor Swift’s Eras tour has literally been the hottest ticket in music over the past few months, with millions of fans scrambling for their spot in arenas and stadiums around the world. But many “Swifties” have been left heartbroken as the demand far outstrips the number of tickets available. To make the pill even more bitter to swallow, there are plenty of tickets available to buy for the sold-out shows – but at many times their face value, on secondary markets.

Cybersecurity Sessions S02E03: Bots vs consumers, social media APIs, ticket scalping legislation

In this month’s episode, we start by focusing on the real-world impact of bots (scripts used to automate tasks and exploit business logic). In the UK, bots are being used to book up every available driving test before reselling them for profit; meanwhile in the US, gig workers delivering groceries are losing out to bots that hoard the most profitable delivery jobs. Our panel explains how this happens and discusses what can be done to stop it.

The Hidden Dangers of Client-Side Bot Detection

If you’re shopping around for a way to stop bots damaging your brand – be that through enabling automated fraud, hoarding your stock, scraping your content or prices, or just eating up server resources – you’ve probably seen vendors advocating the use of “client-side detection”. They’re probably telling you it’s necessary for accurate bot detection.