Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Freebie Bots Turn Scalping on its Head to Rip Off Retailers

For years Netacea has been reporting on the evolving scalper bot landscape. From the early days of sneaker bots, through to hobbyists snatching PlayStation 5 consoles and even vaccine appointments throughout the pandemic, we’ve closely monitored what items scalpers target. Now, a whole new breed of scalper bot has emerged – one that exploits discounts and pricing errors instead of exclusive hype drops, costing retailers hundreds of thousands in lost inventory.

Defending Against Modern Breaches: Lookout's Defense-in-Depth Solution

Today, cloud breaches happen in minutes. Not months. Attackers, with just the right login, can instantly access your data. To halt a breach, identifying and blocking data theft is essential. Prevention, however, begins with securing mobile devices. which are often unprotected, are highly susceptible to social engineering. Lookout adds depth to your defense with security that works at every turn. This includes blocking text messages that steal credentials and preventing compromised accounts from accessing your data. With Lookout, rest assured that your cloud data flows freely, and securely.

Snyk & Atlassian: How to embed security in AI-assisted software development

Adding AI to your software development life cycle (SDLC) comes with great opportunities — and great dangers. Is the risk worth the reward? This was the topic of conversation when Sascha Wiswedel, Senior Solutions Engineer at Atlassian, and Simon Maple, Principal Developer Advocate at Snyk, teamed up to discuss security in the (AI-assisted) software development lifecycle.

13 Top Bot Management Software in the Market for 2024

How do you approach bot management? For certain businesses, the optimal approach could involve selecting a single bot management software to meet their existing bot detection and management needs. For some companies, combining behavioural analytics for identifying malicious bot behaviour and a WAF (WAAP) to defend against vulnerability exploits, DDoS attacks, and API security breaches is essential.

Addressing the Threat of Security Debt: Unveiling the State of Software Security 2024

Today, I’m proud to share our 14th annual State of Software Security report. Our 2024 report shines a spotlight on the pressing issue of security debt in applications, and it provides a wake-up call to organizations worldwide. The demand for speed and innovation has resulted in the accumulation of risk known as security debt. As Chief Research Officer at Veracode, I’m deeply committed to empowering businesses to confront the challenges posed by security debt. Let’s dive in.

Exploring Syscall Evasion - Linux Shell Builtins

This is the first article in a series focusing on syscall evasion as a means to work around detection by security tools and what we can do to combat such efforts. We’ll be starting out the series discussing how this applies to Linux operating systems, but this is a technique that applies to Windows as well, and we’ll touch on some of this later on in the series. In this particular installment, we’ll be discussing syscall evasion with bash shell builtins.