Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Bots

What are Netacea Threat Intel Feeds?

Learn more about Netacea Threat Intel Feeds, including how our customers use them to harden existing defenses, from Netacea CTO & co-founder Andy Still. This video explains how Netacea ensures the accuracy of its threat intelligence, the methods of data distribution, and the practical uses of Threat Intel Feeds in blocking malicious traffic and aiding in decision-making processes.

The Rising Cost of Insecure APIs and Bot Attacks: Global Firms Face $186 Billion in Losses

In the evolving landscape of digital threats, two growing concerns are proving costly for organizations worldwide: insecure APIs and bot attacks. A recent report highlights that these vulnerabilities have escalated dramatically, with global firms suffering financial losses between $94 billion to $186 billion annually. The exponential rise in API adoption, combined with AI-powered bot attacks, has created a perfect storm for cybercriminals to exploit.

Introducing Netacea Threat Intel Feeds

This webinar introduces Netacea Threat Intel Feeds—a tool to harden your defenses against automated attacks using real-world threat data. Join James Middleton, Andy Still, and Cyril Noel-Tagoe as they explore how Netacea processes trillions of requests daily, enabling Threat Intel Feeds to identify and stop attack traffic in real-time, so you can squeeze more value out of your existing edge defenses.

How Scalper Bots Evaded Detection to Snatch Oasis Tickets

At 8:00 on Saturday, 31st August 2024, millions of people were poised to be part of pop culture history. Four days earlier, on 27th August, seminal Britpop heavyweights Oasis shocked the music world by finally confirming their long-awaited reunion. The reconciliation of brothers Liam and Noel Gallagher sent fans into a frenzy. For millions worldwide, it was essential to get tickets to one of the 17 announced gigs. The demand was enormous.

Evolution of Scalper Bots Part 3: Expansion into New Markets

Welcome back to the next blog in our Evolution of Scalping series. During our last blog we covered the landmark case that exposed the power of automated purchasing – Wiseguy Tickets. We detailed their operation and their use of bots, which allowed them to snatch up huge volumes of available tickets for high-demand events.

Cybersecurity Sessions S03E01: "Bot's the Story, Morning Glory?" Oasis Ticket Scalper Bots

Netacea bot experts discuss the challenges around the Oasis reunion tour ticket sales, focusing on the issues caused by bots and scalping in high-demand events. The discussion explores the technical difficulties of managing ticket sales, the tactics used by bot operators to secure tickets, and the broader implications for the industry. The team also discuss why current methods to prevent bot activity often fail and why a multi-pronged strategy combining real-time detection, post-transaction analysis, and clamping down on secondary markets is critical.

7777 Botnet - Insights into a Multi-Target Botnet

Over the last month there have been some updates about the mysterious 7777 botnet—which was first mentioned in this post in October 2023. Until now, it was known that the botnet was made up of TP-LINK routers and that it was being used to execute very low volume and controlled brute force attacks on Microsoft 365 services targeting corporate accounts. In our continuous efforts to have all sorts of malware families under our radar, the 7777 botnet is no exception.

Evolution of Scalper Bots Part 2: The Birth of Scalper Bots

Welcome back to our Evolution of Scalper Bots series. In part one, the Origins of Scalping, we started our journey through scalping’s long history. We saw that it is far from a new concept: people have been reselling high-demand items for centuries, from as far back as 325 BCE! We’ll continue our journey at the turn of the 21st Century. With the advent of online ticketing, a new frontier had just been opened for scalpers, and things would never be the same again.