
Detecting noise in canvas fingerprinting
In a previous blog post, we talked about canvas fingerprinting, a technique commonly used to detect fraudsters and bots. In this post we'll go deeper on how fraudsters can forge or create fake ca...
Sebastian is the CTO & co-founder of Castle. In his role at Castle he's been working closely with companies across different industries to identify and implement strategies for fraud and abuse.
In a previous blog post, we talked about canvas fingerprinting, a technique commonly used to detect fraudsters and bots. In this post we'll go deeper on how fraudsters can forge or create fake ca...
Browser fingerprinting leverages different JavaScript attributes related to the user's device, OS, and browser. When it comes to bot detection, fingerprints can be used as a signature to block att...
In this article, we cover the details of a distributed credential-stuffing attack that targeted the mobile application of a major US on-demand staffing company. By the end of the bot attack, which las...
The latest wave of artificial intelligence (AI) improvements significantly improved the quality of models for image and text generation. Several companies, such as OpenAI (ChatGPT) and Claude provide...
If you spend time on video game forums, you might have noticed posts from users discussing their accounts being hacked or stolen, often mentioning the loss of games or items linked to their accounts....
Open Bullet 2 is an open-source software, specialized in credential stuffing attacks, i.e. attacks that use bots to automatically steal user accounts at scale by automatically testing stolen credentia...
Every day, your computer renders dozens of these without you even noticing. Strange patterns, colorful shapes, and emojis—what do you think these are? These are canvas fingerprints, a technique used...