The API and Application Protection Blog
ThreatX platform updates, threat research on the latest critical CVEs and 0 days impacting APIs and web applications, alongside strategies and tactics for overcoming the challenges of modern security teams.
Subscribe for API and application protection tactics
Sign up for exclusive threat research, company and content updates, and the occasional fun contest.
- Blog
- Application Security
- Threat Intelligence
- News
- Product Updates
- People & Culture
- Vulnerabilities
- Cloud Security
- API Security
Two Most Common Brute Force Attacks We See
The ThreatX Protection-as-a-Service team sees a lot of brute force attacks – or attacks that feature attackers using trial and error to try to access a system. These attacks come in a variety of shapes and sizes, but the one we see most frequently is credential stuffing attacks, and one type that is becoming increasingly […]
VIEW MORE