You see an email ending in .eu.org. Must be legit, right?
At first glance, an email address ending in .eu.org looks trustworthy. It feels institutional, maybe even official. Many people
Antoine is currently the Head of Research at Castle. In this role, he focuses on improving Castle's bot detection engine using different approaches, including behavioral detection, and fingerprinting.
At first glance, an email address ending in .eu.org looks trustworthy. It feels institutional, maybe even official. Many people
In my previous post, I showed how LinkedIn detects browser extensions as part of its client-side fingerprinting strategy. That post
Modern bot detection rarely deals with obviously fake browsers. Most large-scale automation today runs inside browser instances, with patched fingerprints,
In fraud and bot detection, people usually think of fingerprinting as the classic browser or device fingerprint. This comes from
Every month, we publish a snapshot of the email domains most actively used in fake account creation and related abuse
If you have been following this series (post 1 and post 2), you know the ritual by now. I buy
While working on a new customer, we identified a burst of automated activity linked to accounts created before Castle protections
A few months ago, I accidentally bought sneaker proxies. Instead of crying over my mistake, I did what any reasonable
If you landed here after searching for something like “browser fingerprint test”, “bot detection API”, or “Kameleo anti-detect browser”, then
Every month, we publish a snapshot of the email domains most actively used in fake account creation and related abuse
We recently detected and blocked a large-scale fake account creation campaign. The attacker attempted to register tens of thousands of
Why canvas fingerprinting matters in fraud detection Canvas fingerprinting is often presented as a textbook example of browser fingerprinting. The