June Bot Spotlight

June Bot Spotlight

Shining a light on the human minds behind automated threats.  

What's new this month:

We’ve released Kasada’s latest Quarterly Threat Report analyzing stolen accounts across top industries. Fraudsters are exploiting the summer travel season by monetizing cracked accounts obtained by credential stuffing. AI-driven bots are rapidly lowering the skill level needed to launch automated attacks. Our founder Sam discusses Kasada’s journey and bad bots with partner AWS.


Latest Threat Intelligence Report

Curated by Kasada's Threat Intelligence team, this quarter's report analyzes stolen accounts obtained through info-stealing malware, data breaches, and brute-force attacks. Top trends are summarized by industry including retail, gaming, and entertainment.

Read the Report


Surge in Bad Bot Threats Forces Retailers To Bolster Cyber Defenses

Not surprisingly, bad bots generated nearly half of web traffic in the first quarter of 2024. Our Field CTO shared with E-Commerce Times how AI-driven bots are lowering the skill level to launch automated attacks, making it easier than ever to evade traditional detection methods.

Read the Blog


Vacation for only $151.73 – Thanks to Credential Stuffing

Our CMO decided to explore underground stolen account marketplaces to see how little he could spend to book a trip to Aruba. Spoiler alert… he didn't actually purchase any stolen accounts - but others certainly do! Check out this article to see how comprehensive and inexpensive the stolen accounts are within the travel industry.

Read the Blog


AWS Sprint to Success: Conversations with Software Leaders

Our Founder sat down with our partner AWS to discuss Kasada’s solution and journey throughout the years. Sam shares how we are helping some of the largest hospitality and retail companies, protecting their users and bottom line from the negative impact of bad bots.

Watch the Interview


Want to see if an attack is coming?

The KasadaIQ Snapshot is a free custom analysis to identify the early signals of credential stuffing, stolen customer accounts for sale, and the tools fraudsters are using to bypass your security.

KasadaIQ Snapshot

To view or add a comment, sign in

Insights from the community

Others also viewed

Explore topics