Our latest

Research •

How bots and fraudsters exploit free tiers in AI SaaS

The latest wave of artificial intelligence (AI) improvements significantly improved the quality of models for image and text generation. Several companies, such as OpenAI (ChatGPT) and Claude provide...

Research •

How bots and fraudsters exploit video games with credential stuffing

If you spend time on video game forums, you might have noticed posts from users discussing their accounts being hacked or stolen, often mentioning the loss of games or items linked to their accounts....

Research •

Open Bullet 2: The preferred credential stuffing tool for bots

Open Bullet 2 is an open-source software, specialized in credential stuffing attacks, i.e. attacks that use bots to automatically steal user accounts at scale by automatically testing stolen credentia...

Research •

Canvas fingerprinting in the wild

Every day, your computer renders dozens of these without you even noticing. Strange patterns, colorful shapes, and emojis—what do you think these are? These are canvas fingerprints, a technique used...

Research •

Anatomy of a 6-day credential stuffing attack from 2.2M residential IPs

In this article, we cover the details of a heavily distributed credential-stuffing attack that targeted a major US financial service company (spoiler: there were some pretty clear signs of device spoo...

Fixing the blind spots in fraud prevention

Fraud prevention fails when you can’t see what’s happening on your platform. Most companies rely on basic fraud prevention tools that only scratch the surface, leaving them blind to deeper patterns of...