Articles

  • Nov 12, 2024 | securityboulevard.com | Will Glazier

    Credit card fraud is an ongoing challenge for companies across industries, particularly in today's digital landscape where automated bot attacks are becoming increasingly prevalent. Cequence recently assisted a prominent customer in mitigating a sophisticated attack that involved testing stolen credit cards. Attackers used bots to perform small transactions to validate stolen credit cards, aiming to identify cards that were active so that they could be used for larger fraudulent purchases.

  • Sep 5, 2024 | securityboulevard.com | Will Glazier

    Cequence recently protected multiple major telecommunications companies, each a global leader with over 100 million customers, from a series of six high-profile Broken Object Level Authorization (BOLA) API attacks. Most of these companies use Google's Apigee API Gateway and rely on Cequence for advanced threat detection and prevention.

  • Sep 5, 2024 | securityboulevard.com | Will Glazier

    By Will Glazier Cequence recently protected multiple major telecommunications companies, each a global leader with over 100 million customers, from a series of six high-profile Broken Object Level Authorization (BOLA) API attacks. Most of these companies use Google's Apigee API Gateway and rely on Cequence for advanced threat detection and prevention. Cequence successfully ... Read More

  • Aug 14, 2024 | msn.com | Will Glazier

    Microsoft Cares About Your PrivacyMicrosoft and our third-party vendors use cookies to store and access information such as unique IDs to deliver, maintain and improve our services and ads. If you agree, MSN and Microsoft Bing will personalise the content and ads that you see. You can select ‘I Accept’ to consent to these uses or click on ‘Manage preferences’ to review your options and exercise your right to object to Legitimate Interest where used.

  • Aug 14, 2024 | techradar.com | Will Glazier

    Application Programming Interfaces (APIs) have long served as the invisible backbone of online retail. They empower retailers to seamlessly integrate the intricate web of ecommerce systems, orchestrating everything from payment processing to shipping logistics and inventory management. This interconnectedness, however, has also made the retail sector a lucrative target for threat actors.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →