Blog

Blog posts

  • Launching KasadaIQ – A New Attack Prediction Service

    KasadaIQ was born from the desire to share our bot intelligence to predict and prevent online fraud for any company - even if they are not a customer of Kasada.

  • Unveiling Kasada’s Employee Value Proposition (EVP)

    Through the process of creating our EVP statement, we uncovered what truly makes Kasada a unique and rewarding place to work.

  • 5 Bot-Driven Threats to Watch Leading Up to 2023 Holiday Sales

    As the holiday season approaches, brace yourselves for a sleigh-full of automated threats as shown by historical data.

  • Are Bots Behind the Booming iPhone 15 Pre-Orders?

    Kasada has observed adversaries using various bots to successfully place thousands of iPhone 15 pre-orders, including the iPhone 15 Pro Max.

  • My Journey ‘Working From Anywhere’ at Kasada

    Kasada's 'work from anywhere' policy gave me the personal autonomy and flexibility I needed when it mattered most.

  • The Future of Web Scraping

    If data is the new oil, then web scraping is the new oil rig. The potential impact of web scraping is escalating as the twin forces of alternative data and AI training both rapidly increase in size and complexity.

  • Stolen Auto Accounts: The $2 Price Tag on Your Car’s Identity

    New threat intelligence uncovers nearly 15,000 automotive accounts for sale online, the likely result of a credential stuffing attack to hit top car manufacturers.

  • Paid Subscriptions to Stop Bots: Is Elon Musk Right?

    Subscription-based services aren't the silver bullet to stopping bot attacks - with the right motivation, these accounts are just as likely to be botted.

  • The Bot Mitigation Game Has Changed, Again

    As the battle between bot creators and defenders rages on, the ability to consistently collect untampered data becomes a pivotal factor in the effectiveness of bot mitigation.

  • Did You Just Try to Login? Why Account Takeover Is Still on the Rise

    Account takeover attacks remain remarkably successful, mainly due to their reliance on inexpensive automation and credential stuffing tools.

Knowledge and expertise creates protection that evolves