Hi [[ session.user.profile.firstName ]]

Bulletproof Proxies: How Large Scale Attacks Hide in Plain Sight

Bulletproof Proxies have taken the concepts of anonymity and availability found in Bulletproof Hosting and extended them to the automated bot attack delivery infrastructure by using large networks of Residential Proxies that mask identity and location. Bulletproof Proxies allow bad actors to distribute their attacks across legitimate user locations making detection and prevention difficult.

This session will cover the following topics:
•The rise of Bulletproof Proxies – how they came to exist
•The balancing act between legitimate and malicious use
•Techniques used to mask their identity and location
•Details on large scale attacks targeting financial services and retail sector
Recorded Jan 30 2020 41 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Will Glazier
Presentation preview: Bulletproof Proxies: How Large Scale Attacks Hide in Plain Sight

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How APIs Simplify Automated Attacks: Prying-Eye Direct-to-API Enumeration Attack Feb 27 2020 7:00 pm UTC 25 mins
    Shreyans Mehta
    The Prying-Eye enumeration vulnerability recently discovered in leading web conferencing applications by the CQ Prime research team highlights how APIs used in your public facing applications provide bad actors with the same ease of use, efficiency and flexibility benefits that APIs bring to the development community. Rather than scripting a web form fill, to launch an attack, bad actors will analyze the web or mobile application to understand the business logic while discovering the APIs in use. Armed with that information, bad actors can then create a bot that will execute an automated attack directly against the APIs. In this session, Shreyans Mehta, CTO and Co-founder of Cequence Security will share recent details of the Prying-Eye attack and the prevalence of using APIs for automated attacks. He will close with security recommendations and how Cequence Security can help.
  • Better Together: Automated Bot Protection with AWS and Cequence Security Feb 21 2020 7:00 pm UTC 60 mins
    Stephen Mayne, Partner Solutions Architect at AWS and Subbu Iyer, VP of Products at Cequence Security
    Automated attacks against public facing web, mobile and API-based apps deployed on AWS can result in fraud, theft, lost sales, reduced customer confidence and infrastructure cost overruns. These attacks appear to be legitimate transactions, hiding in plain sight, making detection and prevention an ongoing security challenge.

    Deployed in conjunction with Amazon CloudFront and AWS WAF, CQ botDefense SaaS detects your public facing applications and APIs, then analyzes each transaction using ML-based automation indicators to uncover and block malicious activity.

    Join AWS, and Cequence Security to learn how malicious bots target your public facing applications and how you can protect them.
  • Bulletproof Proxies: How Large Scale Attacks Hide in Plain Sight Recorded: Jan 30 2020 41 mins
    Will Glazier
    Bulletproof Proxies have taken the concepts of anonymity and availability found in Bulletproof Hosting and extended them to the automated bot attack delivery infrastructure by using large networks of Residential Proxies that mask identity and location. Bulletproof Proxies allow bad actors to distribute their attacks across legitimate user locations making detection and prevention difficult.

    This session will cover the following topics:
    •The rise of Bulletproof Proxies – how they came to exist
    •The balancing act between legitimate and malicious use
    •Techniques used to mask their identity and location
    •Details on large scale attacks targeting financial services and retail sector
  • New Report: The State of Web Application Firewalls Recorded: Jun 25 2019 43 mins
    Dr. Larry Ponemon and Franklyn Jones
    A new research report reveals that web application firewalls (WAFs) are not providing effective protection against application-layer attacks.

    The Ponemon Institute surveyed 595 organizations and discovered that 65% experienced successful application-layer attacks that bypassed their existing WAFs.

    This webinar reveals the findings from the survey and the current state of WAFs in 2019, including:

    ● Why IT security pros are dissatisfied with their WAF and what features they want

    ● The security and resource costs of deploying traditional WAFs

    ● The best-practice guidance on addressing application security with WAFs

    Dr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute, a research “think tank” dedicated to advancing privacy, data protection, and information security practices.
  • ISMG NYC Fraud Summit Presentation: Malicious Bot Attacks Recorded: Apr 4 2019 29 mins
    Franklyn Jones
    This presentation walks through key information on the new #1 cyber threat, and why you should be concerned, including:

    1) Why do attacks happen?
    2) What is their objective?
    3) How does it impact business?
    4) How can they be stopped?
  • Retail and Hospitality ISAC Webinar: Real World Security Exploits Recorded: Feb 28 2019 50 mins
    Eric Bucher
    Educational webinar. How malicious bots, tools, infrastructure, and credentials challenge the security of the retail industry.
  • Research Findings: The Critical Need to Deal With Bot Attacks Recorded: Jan 30 2019 41 mins
    Michael Osterman & Franklyn Jones
    Join us for this exciting webinar that presents the findings from an in-depth survey by Osterman Research on the current practices that large organizations use to detect and remediate bot attacks and their effects on their organizations.

    What you'll learn from this webinar:

    1) An understanding of the current state of bot attack management

    2) How satisfied respondents are with current bot management technologies and practices

    3) Areas within their current security practices that need improvement to cope with bot attacks

    4) Guidance on the best practices to address bot management and their effects on your organization and your customers

    Don't miss this webinar. Reserve your spot now!
  • Breaking Bad Bots –The New #1 Threat and How to Stop Them Recorded: Jan 22 2019 48 mins
    Shreyans Mehta, co-founder and CTO. Franklyn Jones, CMO
    Did you know bad bots now account for nearly 1/3 of all Internet traffic? Well yes, they do! And they pose the greatest threat to organizations that use web, mobile, and API application services to support business processes.
  • How to Stop Malicious Bot Attacks Recorded: Nov 13 2018 4 mins
    Cequence Security
    Malicious, automated bots now account for nearly 1/3 of all Internet traffic.

    They’re targeting your web, mobile, and API application services for their financial gain. Traditional security tools have proven to be ineffective. Here’s a quick introduction to the problem and the game changing bot defense platform from Cequence Security.
Discover apps, detect attacks, and defend your business from bad bots.
Cequence Security, based in Sunnyvale, CA, is a venture-backed startup focused on delivering highly automated, application security software solutions for today’s hyper-connected organizations. Cequence is committed to developing solutions that will not only significantly strengthen the security postures of its customers, but will also deliver the automation needed to improve the productivity and efficiency of its IT staff. The Cequence Security leadership team previously contributed to the growth and success of Palo Alto Networks and Symantec.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Bulletproof Proxies: How Large Scale Attacks Hide in Plain Sight
  • Live at: Jan 30 2020 7:00 pm
  • Presented by: Will Glazier
  • From:
Your email has been sent.
or close