Request a Demo

Cequence Security is proud to receive so many industry accolades.

But it’s even more rewarding to know that we’re protecting the critical applications of some of the largest organizations in the world.

Featured Content

Prying-Eye Vulnerability

Direct-to-API Enumeration Attack Enables Snooping

The Prying-Eye vulnerability is an example of an enumeration attack that targets web conferencing APIs with a bot that cycles through (enumerates) and discovers valid numeric meeting IDs. If the common user practice of disabling security functionality or not assigning a password is followed, then the bad actor would be able to view or listen to an active meeting.

Customer Interview

Protecting Zoosk from Automated Bot Attacks

Alissa Knight, Senior Analyst with Aite Group, sits down with Zoosk to discuss how they use the Cequence Application Security Platform to protect their public-facing applications from malicious bot attacks.

Bulletproof Proxies:

The Evolving Cybercriminal Infrastructure

Just Posted! Bulletproof Proxies have taken the concepts of anonymity and availability found in Bulletproof Hosting and extended them to the delivery infrastructure required to launch automated bot attacks against public facing applications. These attacks utilize legitimate transactions to commit automated fraud while hiding in plain sight. WOW!