![](https://www.threatx.com/wp-content/uploads/2021/06/resourcers-hero-bg-1.jpg)
The API and Application Protection Blog
ThreatX platform updates, threat research on the latest critical CVEs and 0 days impacting APIs and web applications, alongside strategies and tactics for overcoming the challenges of modern security teams.
Subscribe for API and application protection tactics
Sign up for exclusive threat research, company and content updates, and the occasional fun contest.
- Blog
- Application Security
- Threat Intelligence
- News
- Product Updates
- People & Culture
- Vulnerabilities
- Cloud Security
- API Security
How to Identify Distributed Botnet-Based Attacks
Botnet-based attacks like credential stuffing are occurring more often because credentials are frequently bought, sold, stolen, and leaked. Recent examples of leaks are the Uber breach announced on Sept 16, 2022 (the official announcement can be found here), and the American Airlines breach that was reported the day before on the 15th (more information can […]
VIEW MORE