
Roll your own bot detection: server-side detection (part 2)
This is the second part of our series on building a lightweight, vendor-free anti-bot system to protect your login endpoint.
This is the second part of our series on building a lightweight, vendor-free anti-bot system to protect your login endpoint.
This is the first article in a two-part series where we show how to build your own anti-bot system to
This is the sixth edition of our monthly tracker highlighting email domains linked to fraudulent activity. Just like in August&
The navigator.deviceMemory attribute is part of the Device Memory API. It exposes an approximate amount of system RAM to
CAPTCHAs are everywhere, and almost universally hated. Whether it's deciphering blurry text or clicking every fire hydrant in
Over the past few years, I’ve written a lot about detecting automated browsers by exploiting side effects from the
This is the fifth edition of our monthly tracker highlighting email domains linked to fraudulent activity. Just like in July&
Every month, we publish a list of fraudulent email domains observed across the websites and mobile apps we protect. See
Open Bullet 2 is an open-source tool built for credential stuffing attacks, automated attempts to gain access to user accounts
This is the fourth edition of our monthly tracker highlighting email domains linked to fraudulent activity. Just like in June&
Headless Chrome bots controlled by Selenium remain a staple in the bot developer’s toolkit in 2025. While newer frameworks
Most disposable email services are easy to detect. They use obvious domains like tempmail.xyz or tmxttvmail.com, which are