
Detecting noise in canvas fingerprinting
In a previous blog post, we talked about canvas fingerprinting, a technique commonly used to detect fraudsters and bots. In
Sebastian is the CTO & co-founder of Castle. In his role at Castle he's been working closely with companies across different industries to identify and implement strategies for fraud and abuse.
In a previous blog post, we talked about canvas fingerprinting, a technique commonly used to detect fraudsters and bots. In
Browser fingerprinting leverages different JavaScript attributes related to the user's device, OS, and browser. When it comes to
In this article, we cover the details of a distributed credential-stuffing attack that targeted the mobile application of a major
The latest wave of artificial intelligence (AI) improvements significantly improved the quality of models for image and text generation. Several
If you spend time on video game forums, you might have noticed posts from users discussing their accounts being hacked
Open Bullet 2 is an open-source software, specialized in credential stuffing attacks, i.e. attacks that use bots to automatically
Every day, your computer renders dozens of these without you even noticing. Strange patterns, colorful shapes, and emojis—what do
In this article, we cover the details of a heavily distributed credential-stuffing attack that targeted a major US financial service
Our mission at Castle is to equip you with the most effective tool to detect and stop bad actors within
Are your users annoyed by constantly being hit with CAPTCHAs? Find out what how you can improve the user experience while keeping your site secure
What does the zero-trust security model look like when it’s applied to online fraud and abuse? In this post, I’ll delve into how concepts from zero-trust can be used to fight fraud and abuse with higher accuracy and less user frustration.
Policies lets you create tailored rules that suit your specific needs. It’s designed to work in various scenarios, whether you're dealing with account abuse, account takeovers, or combating SMS-pumping