Over the recent years, Credential stuffing has quietly morphed from noisy password spraying into a surgical, multi stage business logic manipulation that spoofs devices and target APIs, often without ever triggering traditional bot defenses. Join Arik Atar, a Senior CTI Researcher, as he shares and explains his research findings. Drawn from Radware’s analysis of 100 advanced credential stuffing attack scripts on Q3 2025, this session lays bare the tactics that make modern account takeover campaigns almost invisible at the application layer.
What You Will Learn
• Everything your security team should know: Behavioral and technical clues that expose cross device spoofing, BLA, and API attacks in real time.
• How do threat actors scan and map your application's business logic to manipulate their way into users' accounts?
• Leverage Radware Protections: How Radware’s Bot Manager, API Security, and Cloud WAF combine for end to end mitigation.
Who Should Attend
Application security owners, SOC analysts, fraud prevention teams, CISOs, and anyone tasked with safeguarding customer identities or high value digital assets.
Secure Your Seat
Spaces fill quickly—don’t miss this chance to out think a new generation of attackers before they monetize your users’ data.
Register now and receive a complimentary executive summary of the full report.