Hi [[ session.user.profile.firstName ]]

Latest Credential Stuffing Attack Campaigns In Asia Pacific

The wide availability of compromised credentials combined with new sophisticated automated attack techniques have made credential stuffing a risk to many businesses. For your adversaries, it is one of the most lucrative and effective forms of web fraud. For you, these swift and sophisticated attacks could put revenue, productivity, and reputation all at risk.

Learn about recent attack patterns and how to defend against them.

This talk covers:
- Anatomy of a credential stuffing attack and the common bot detection challenges that organisations face
- Current examples of credential stuffing attack campaigns across retail, financial services and other industries in Asia Pacific
- Approaches to mitigating the increasingly sophisticated attack methods

Our presenter is Fernando Serto, Director of Security Technology & Strategy for Akamai Technologies in Asia Pacific.
Recorded Apr 28 2020 23 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Fernando Serto - Director, Security Technology & Strategy, Akamai
Presentation preview: Latest Credential Stuffing Attack Campaigns In Asia Pacific

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The State of Open Banking in Australia Recorded: Feb 5 2021 59 mins
    Zhi-Ying Barry, Forrester Senior Analyst & Johnny Yeo, Akamai Enterprise Security Architect
    Financial institutions are in the midst of open banking transformation. Many are focused on the core principles, but others are embracing the growth opportunity. We believe it is timely to take stock of progress and share best practices for open banking innovation.

    Join Forrester Senior Analyst, Zhi-Ying Barry, for her latest research on open banking and Johnny Yeo, Akamai Enterprise Security Architect, for his technical advice on APIs. Together they will lead an interactive session featuring:

    • Insights on the progress towards open banking in Australia
    • Reference architectures for delivering, scaling and securing APIs
    • Examples of organisations using open banking for innovation
  • Serverless Edge Computing with Akamai EdgeWorkers Recorded: Feb 3 2021 55 mins
    Akamai Technologies
    Akamai has deployed JavaScript engines across our platform, creating the most broadly distributed, low-latency, serverless edge computing platform available. With EdgeWorkers, developers can quickly create functions and deploy across our platform. Watch this session to explore more on how you can leverage EdgeWorkers for your web properties.

    Key takeaways from the workshop:
    - Overview of EdgeWorkers and deep-dive on benefits
    - Examples of a few use-cases to get you started
    - How to sign up for EdgeWorkers
  • State of the Internet / Security: 2020 – A Year in Review Recorded: Jan 22 2021 62 mins
    Martin McKeay, Editorial Director & Sid Deshpande, Director of Security Strategy, APJ - Akamai Technologies
    What a year. As the world adapted to the pandemic lockdowns, criminals did, too. There’s no doubt that many of the changes we’ve seen to the threat landscape are here to stay. Join us for our live webinar as we discuss how:

    - Criminals have adapted during the pandemic to take advantage of changes in how we work and function daily
    - Increased automation now drives tens of millions of web application attacks a day
    - DDoS extortion schemes across Asia Pacific bring threats of business-crippling attacks across industries
    - Remote workers are more vulnerable than ever as attackers continue to capitalize on the increased digital risk surface

    Don’t miss this chance to review key security learnings of 2020, and prepare for 2021 and beyond. Register now.
  • Cybersecurity Threat Trends – What 2020 Can Teach Us About 2021 And Beyond Recorded: Dec 7 2020 52 mins
    Sid Deshpande, Director of Security Strategy, Akamai Technologies
    2020 has been a unique year in so many ways, and the cybersecurity landscape is no different. Threats vectors and threat actors have rapidly evolved their attack methods to match the changes in the digital risk surface and security teams have had to spend considerable effort to keep pace with new types of threats.

    This session will look at key threats organizations faced in 2020, from DDoS and credential stuffing attacks, to attacks on remote working infrastructure, with a focus on extracting key learnings to help security leaders prepare their security strategies for 2021 and beyond.
  • 써드파티 스크립트 애플리케이션 보안: 침입 vs 탐지 Recorded: Oct 30 2020 15 mins
    아카마이 코리아, 신동곤 상무
    신용카드 스키밍(skimming)은 오랫동안 보안팀의 도전과제였습니다. 해커들은 물리적 디바이스에서부터 폼재킹, 스크립트 인젝션과 같은 온라인 정보 수집 공격에 이르기까지 웹 보안 시스템보다 앞서 나가기 위해 지속적으로 전략을 발전시키고 있습니다. 최근에 꾸준히 증가하는 스키밍 방식은 애플리케이션에 존재하는 파트너·공급망 써드파티 스크립트를 활용합니다. 앱으로 들어오는 수상한 침입을 차단하는 기존의 방식도 유용하지만, 벌금이 증가하고 대규모 유출이 발생하고 있다는 점을 고려할 때 개인식별정보(PII)가 탈취되는 것을 막을 수 있는 조치를 반드시 마련해야 합니다.

    발표 내용은 다음과 같습니다.
    Magecart 공격의 역사와 규모
    써드파티 스크립트의 증가가 취약점 증가로 이어지는 이유
    스크립트 감염 분석 및 대응 방법
    Magecart를 효과적으로 방어하는 서비스의 특징
    써드파티 스크립트의 상황을 분석하는 데 유용한 팁

    발표자는 Akamai Technologies의 신동곤 상무입니다.
  • Customer Identity And Access Management: Deciding Between “Build vs Buy” Recorded: Oct 29 2020 26 mins
    Manish Upadhaya, Senior Security Sales Specialist, Akamai & Dawson Sewo, Prin. Cloud Security Architect, Akamai
    Digital identity and customer profiles are at the center of every company's digital transformation. In today's markets, customer identities and personal data associated with them are among the most critical and valuable assets of any enterprise.

    This talk explores the pros and cons of in-house CIAM solutions versus commercial CIAM solutions - taking into account changing requirements dictated by resource, technology, innovation, customer experience, security compliance and regulations. It features a range of recent CIAM case studies in Asia Pacific, including the Communications & Media, Energy & Utilities and Consumer Electronics industries.

    Our presenters from Akamai Technologies are Manish Upadhaya, Senior Security Specialist and Dawson Sewo, Principal Cloud Security Architect.
  • Webスキミングの最新手口と、PIMによる最先端のブラウザ内悪性スクリプト検知技術 Recorded: Oct 28 2020 28 mins
    ハレンドラ バンダリ
    「新しい生活様式」のもと経済活動のインターネットへの依存が高まる中で、アカウント情報やカード情報などを盗むWebスキミング攻撃の増加が懸念されています。ウェブスキミング/Magecart 攻撃の手口をを再現デモを交えて明らかにするとともに、Akamaiの開発した最新のWebスキミング対策について解説します。
  • 第三方脚本应用程序安全性:入侵与检测 Recorded: Oct 27 2020 18 mins
    信用卡数据窃取一直是安全团队面临的一大挑战。从实体设备到在线搜集攻击(例如表单劫持和脚本注入),黑客一直在不断推动攻击策略的发展,企图比 Web 保护程序领先一步。稳步增加的最新数据窃取方法利用了应用程序中存在的合作伙伴和供应链第三方脚本。尽管阻止可疑的应用程序入侵活动的传统方法仍然很有价值,但是大规模的泄露事件和不断增加的罚款使得企业必须立即采取行动,以防止个人身份信息被窃。

    ● Magecart 攻击的发展历程和攻击规模
    ● 第三方脚本的兴起如何造成漏洞增加
    ● 有关脚本入侵与缓解方法的分析
    ● 有效的 Magecart 保护服务的属性
    ● 有关第三方脚本分析的技巧
  • 봇의 이해와 역할 Recorded: Oct 23 2020 29 mins
    아카마이 코리아, 한준형 상무
    우리 주변에는 좋은 봇도 있고 나쁜 봇도 있습니다. 나쁜 봇은 DDoS, 웹 애플리케이션 공격, 크리덴셜 스터핑 등 다양한 공격에 사용될 수 있습니다. 반면 좋은 봇은검색 엔진 최적화, 대화형 인터페이스, 서비스 통합과 같은 유용한 비즈니스 기능을 제공할 수 있습니다. 디지털 플랫폼에 API를 도입하고 자동화하는 기업들이 증가하고 있습니다. 따라서 좋은 봇이 제 기능을 할 수 있도록 허용하고 동시에 악성 봇과 관련된 리스크를 관리해야 합니다.

    Akamai Technologies, 기술 영업 매니저 한준형 (Chun Han)은 이 발표를 통해 봇의 진화, 봇을 활용한 공격 및 다크웹의 경제를 설명하고 효과적인 봇 관리 방법을 공유합니다. 또한 일부 상용화된 봇이 합법적인 비즈니스로 가장하고 특정 온라인 기업을 공격하는 방법도 자세히 설명합니다. 봇의 작동 방식과 봇 운영자의 의도에 대한 이해도를 높이면 정상적인 고객의 사용자 환경에 영향을 주지 않으면서 빠르게 변화하는 봇 운영자의 기술에 효과적으로 대응할 수 있습니다. 어떻게 대비해야 할지, 어떤 부분을 고민해야할지를 기업과 개인 입장에서 제시합니다.

    발표자는 Akamai Technologies의 한준형 상무, Korea Media PreSales Manager입니다.
  • Code Less, Optimise More: How to Automate Image and Video Management at Scale Recorded: Oct 22 2020 47 mins
    Adam Newman, Global Sr. Product Manager, Web Performance Solutions & Sven Dummer, Global Sr. Product Marketing Manager
    Our lives have shifted online. Without the ability to see and touch, images and videos are providing the connections to our physical world. Consumers rely on what they can see online before making a buying decision.

    But these are also times of limited bandwidth and network overload. Media-rich websites and apps are creating challenges for marketers, visual design teams, and web developers alike. Delivering high-quality images and video with speed and impact is more difficult than ever. Nothing is more frustrating for consumers if they want to zoom in on a detail and all they get is a pixelated, blurry mess.

    Imagine all your videos and images delivered in the optimal format, tailored to the screen size of each end user, and always with the best possible visual quality — all without the need to touch your code or your image and video files. And imagine you could do this in a heartbeat across all your websites and apps without having to touch every single one of them.

    Too good to be true? In this webinar, we will introduce and demonstrate how Image & Video Manager can be used to:

    - Simplify and automate the process of image and video optimisation
    - Deliver the right formats, sizes, and visual quality tailored to each end user’s specific browser, device, and network connection in real time
    - Decrease page weight by reducing file sizes without quality degradation
    - Do all of the above without the need to write complex code and generate countless derivative renditions of your media assets
    - In fact, do all of the above without writing any code, generating any derivatives, or making any changes to your digital asset management (DAM)

    You’ll also learn about next steps for your free trial of Image & Video Manager.
  • State of the Internet / Security: Loyalty for Sale - Retail & Hospitality Fraud Recorded: Oct 22 2020 55 mins
    Martin Mckeay, Patrick Sullivan & Tony Lauro - Akamai Technologies
    Retail, travel, and hospitality were among the hardest-hit industries this year. But what was it about those industries that attracted 63% of credential stuffing attacks and 41% of web application attacks in the past two years? The answer is simple: loyalty points.

    Our threat researchers discovered alarming security vulnerabilities in these three industries while analyzing our exclusive data up through Q2 2020.

    Watch our on-demand webinar, where you’ll learn:

    • Common tactics in credential stuffing, web application, and DDoS attacks
    • The vast underground marketplace in stolen accounts
    • Strategies and tech solutions to protect your customer data
    • Simple steps to protect your own loyalty accounts

    • Martin McKeay, Editorial Director
    • Patrick Sullivan, Sr. Director of Global Security Strategy
    • Tony Lauro, Director, Security Technology & Strategy
  • フィッシング攻撃の新しいエコシステム Recorded: Oct 21 2020 31 mins
    金子 春信
  • State of the Internet / Security: Gaming - You Can't Solo Security Recorded: Oct 21 2020 58 mins
    Martin McKeay, Steve Ragan & Molly Elise Young - Akamai Technologies
    Disposable income. Socially active online. Passionate about gaming. Sound familiar?

    For cybercriminals, this combination makes gamers a lucrative target. Add COVID-19 lockdowns to the mix — like Steam’s record-setting day of 24 million players online — and conditions are extraordinarily ripe for attack.

    Join us for our upcoming webinar, where we’ll examine the security threats against gamers. Get insights on:
    • Attack volumes and seasonal patterns over two years through Q2 2020
    • The top web attack vectors in gaming and across all industries
    • Gamer perspectives based on a survey of over 1,200 (in partnership with DreamHack)
    • How gamers should protect their accounts

    Our expert panelists include gamers (including one who has played some version of modded Minecraft almost every day for the past decade). Register to watch today!

    • Martin McKeay, Editorial Director
    • Steve Ragan, Editor & Security Researcher
    • Molly Elise Young, Security Compliance Specialist II
  • 客户身份和访问管理:做出“自行构建还是购买”的决定 Recorded: Oct 20 2020 23 mins

    本次演讲探讨了自主开发的 CIAM 解决方案与商业 CIAM 解决方案的优缺点,其中结合了资源、技术、创新、客户体验、安全合规性和法规等因素带来的不断变化的要求。演示中重点分析了亚太地区最近的一系列 CIAM 案例,涉及通信与传媒、能源与公用事业和消费类电子产品行业。
  • State of the Internet / Security: Credential Stuffing in the Media Industry Recorded: Oct 20 2020 60 mins
    Martin McKeay, Steve Ragan & Patrick Sullivan - Akamai Technologies
    From astronomical spikes in attack numbers to new markets for illegal access, COVID-19 has had a major impact on account takeover attacks against the media industry.

    Join Akamai security experts as we explore trends that surfaced in the 2018–2019 data, and how they exploded in 2020. Security professionals: Don’t miss this on-demand webinar. These new discoveries about credential stuffing are critical — no matter what industry you’re in.

    • Martin McKeay, Editorial Director
    • Steve Ragan, Editor & Security Researcher
    • Patrick Sullivan, Sr. Director of Global Security Strategy
  • 최신 크리덴셜 스터핑 공격 사례 Recorded: Oct 16 2020 15 mins
    아카마이 코리아, 한준 부장
    정교하고 자동화된 최신 공격 기술이 등장하고 유출된 인증정보가 광범위하게 사용되면서 크리덴셜 스터핑은 많은 기업들에게 리스크가 되었습니다. 크리덴셜 스터핑은 가장 효과적이고 수익성이 높은 웹 사기 중 하나입니다. 또한, 신속하고 정교한 크리덴셜 스터핑 공격은 기업의 매출, 생산성, 평판을 저해할 수 있습니다.

    최신 공격 패턴과 이를 방어할 수 있는 방법에 대해 알아보시기 바랍니다.

    발표 내용은 다음과 같습니다.
    크리덴셜 스터핑 공격의 특징과 기업이 직면한 일반적인 봇 탐지 문제
    현재 아시아 지역의 리테일, 금융, 기타 산업 전반에 걸친 크리덴셜 스터핑 공격 사례
    점점 정교해지는 공격을 방어하는 방법

    발표자는 Akamai Technologies의 한준 부장입니다.
  • The Total Economic Impact of Akamai Edge Security Recorded: Oct 15 2020 49 mins
    Renny Shen, Director, Product Marketing, Akamai | Bob Cormier, VP & Principal Consultant, Forrester Consulting
    While security vendors often talk about financial costs in terms of brand damage and lost revenue, quantifying the actual economic impact from a security solution can be a daunting task.

    Akamai commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study, interviewing Akamai customers on their experiences with Akamai edge security solutions, including DDoS protection, web application firewall, bot management, secure web gateway, and secure application access.

    The result is a repeatable methodology for any organization to calculate security benefits in terms of revenue protection, decommissioning legacy security products, reduced hardware spend, and security FTE savings.

    Join this live webinar with guest speaker Bob Cormier, vice president and principal consultant at Forrester Consulting, and Renny Shen, director of product marketing at Akamai.

    At the end of the webinar, you will have a good understanding of the methodology used and how to apply this with an interactive calculator to evaluate the potential financial benefits your organization can realize.


    • Akamai edge security products overview
    • Forrester Research TEI methodology
    • Key findings
    • Financial benefits summary
    • Q&A
  • 事業継続性ーこれまでの経験から何を学んだか? Recorded: Oct 14 2020 35 mins
    金子 春信
  • 了解爬虫程序以及由爬虫引发的撞库攻击 Recorded: Oct 13 2020 31 mins
    僵尸网络可能是良性的,也可能是恶意的。恶意爬虫程序可用来发起各种攻击,从 DDoS、Web 应用程序攻击一直到撞库。另一方面,良性的爬虫程序可以提供合法的业务功能,例如搜索引擎优化、对话界面和服务聚合。随着企业在其数字平台中引入更多的自动化机制和 API,他们需要允许良性的爬虫程序正常工作,同时也要管理与恶意的爬虫程序相关的风险。

    在这次演讲中,Akamai 安全专家将带您了解撞库攻击中的恶意爬虫程序带来的暗网经济,并探讨有效的爬虫程序管理方案。他还会谈到一些商业化的爬虫程序操纵者如何伪装成合法企业,并针对特定在线品牌发起攻击。通过更好地了解爬虫程序的工作原理以及爬虫程序操纵者的动机,您可以有效抵御爬虫程序操纵者快速发展演进的技术,同时保证不会影响合法客户的用户体验。
  • A2C of cyber security - Securing Applications, API & Preventing Credential Abuse Recorded: Oct 9 2020 76 mins
    L.S Subramanian, Aseem Ahmed, Biju K, Subhojit Roy, Gurprit Singh Grewal, Krishna Raj Sharma, Babu Nair
    Presenting a conversation with the CXOs of the Banks and NBFCs on The A2C of Cybersecurity and Customer Experience. The conversation throws light on how the manifold rise in digital transactions has given newer directions to adopt technologies with a combination of enhanced Security and customer delight. API attacks, Application attacks and the credential abuse have risen in leaps and bounds and delivering scalable, and user-friendly technologies are the need of the hour.

    This session covers how the CIOs and the CISOs of the organisations have planned not only to mitigate risks but at the same time embracing new technologies to sustain growth and profitability. It discusses how organisations are speeding up innovations, improving service stability, introducing new UXs and also taking care of customer satisfaction to catapult them to newer heights.

    Discussions around how cloud has seen strong adoption in many organisations and a strong security and compliance strategy around cloud is also a covered this conversation. Watch experts from leading banks & NBFCs from around India discuss their cybersecurity priorities for the near future and best practices around application & API security and credential abuse.
Discover the latest talks and webinars with Akamai expert perspectives
Akamai secures and delivers digital experiences for the world’s largest companies. Our intelligent edge platform keeps apps and experiences closer to users — and attacks and threats far away. Top brands globally rely on Akamai so their businesses can be fast, smart, and secure.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Latest Credential Stuffing Attack Campaigns In Asia Pacific
  • Live at: Apr 28 2020 6:45 am
  • Presented by: Fernando Serto - Director, Security Technology & Strategy, Akamai
  • From:
Your email has been sent.
or close