The Prying-Eye enumeration vulnerability recently discovered in leading web conferencing applications by the CQ Prime research team highlights how APIs used in your public facing applications provide bad actors with the same ease of use, efficiency and flexibility benefits that APIs bring to the development community. Rather than scripting a web form fill, to launch an attack, bad actors will analyze the web or mobile application to understand the business logic while discovering the APIs in use. Armed with that information, bad actors can then create a bot that will execute an automated attack directly against the APIs. In this session, Shreyans Mehta, CTO and Co-founder of Cequence Security will share recent details of the Prying-Eye attack and the prevalence of using APIs for automated attacks. He will close with security recommendations and how Cequence Security can help.
Stephen Mayne, Partner Solutions Architect at AWS and Subbu Iyer, VP of Products at Cequence Security
Automated attacks against public facing web, mobile and API-based apps deployed on AWS can result in fraud, theft, lost sales, reduced customer confidence and infrastructure cost overruns. These attacks appear to be legitimate transactions, hiding in plain sight, making detection and prevention an ongoing security challenge.
Deployed in conjunction with Amazon CloudFront and AWS WAF, CQ botDefense SaaS detects your public facing applications and APIs, then analyzes each transaction using ML-based automation indicators to uncover and block malicious activity.
Join AWS, and Cequence Security to learn how malicious bots target your public facing applications and how you can protect them.
Bulletproof Proxies have taken the concepts of anonymity and availability found in Bulletproof Hosting and extended them to the automated bot attack delivery infrastructure by using large networks of Residential Proxies that mask identity and location. Bulletproof Proxies allow bad actors to distribute their attacks across legitimate user locations making detection and prevention difficult.
This session will cover the following topics:
•The rise of Bulletproof Proxies – how they came to exist
•The balancing act between legitimate and malicious use
•Techniques used to mask their identity and location
•Details on large scale attacks targeting financial services and retail sector
Join us for this exciting webinar that presents the findings from an in-depth survey by Osterman Research on the current practices that large organizations use to detect and remediate bot attacks and their effects on their organizations.
What you'll learn from this webinar:
1) An understanding of the current state of bot attack management
2) How satisfied respondents are with current bot management technologies and practices
3) Areas within their current security practices that need improvement to cope with bot attacks
4) Guidance on the best practices to address bot management and their effects on your organization and your customers
Shreyans Mehta, co-founder and CTO. Franklyn Jones, CMO
Did you know bad bots now account for nearly 1/3 of all Internet traffic? Well yes, they do! And they pose the greatest threat to organizations that use web, mobile, and API application services to support business processes.
Malicious, automated bots now account for nearly 1/3 of all Internet traffic.
They’re targeting your web, mobile, and API application services for their financial gain. Traditional security tools have proven to be ineffective. Here’s a quick introduction to the problem and the game changing bot defense platform from Cequence Security.
Discover apps, detect attacks, and defend your business from bad bots.
Cequence Security, based in Sunnyvale, CA, is a venture-backed startup focused on delivering highly automated, application security software solutions for today’s hyper-connected organizations. Cequence is committed to developing solutions that will not only significantly strengthen the security postures of its customers, but will also deliver the automation needed to improve the productivity and efficiency of its IT staff. The Cequence Security leadership team previously contributed to the growth and success of Palo Alto Networks and Symantec.