GLOSSARY

Learning Glossary

Resources and valuable insights to help safeguard your online channels, brand reputation, and customers from automated threats.

An account takeover (ATO) is when a cybercriminal unlawfully accesses an online account for malicious purposes, causing service interruptions, stolen personal data, or initiating fraudulent transactions

Application programming interface (API) security is the practice of mitigating and protecting APIs from cyber threats and attacks on their critical data.

  • API Security Best Practices to Protect Your Business
  • Top 10 API Security Vulnerabilities and How to Strengthen Them
  • API Security Testing and Tools to Secure Your APIs
  • Common API Attack Examples

Bot detection distinguishes good bots from bad bots and helps identify malicious requests generated by bad actors ultimately protecting online applications from potential automated threats.

Bot management identifies bot activity and stops harmful bots from doing damage, while allowing good bots through

  • How Bot Management can Prevent Negative SEO
  • How to Protect Your Business from Bad Bots with Bot Management Software
  • How to Identify and Avoid Skewed Analytics
  • How Bot Management Can Improve User Experience

Bot mitigation is the process of identifying, monitoring, and mitigating malicious automation. Bot mitigation not only identifies and stops bad bots it also aims to prevent future attacks.

Carding or carding attacks are the illegal practice of using stolen credit card information to make fraudulent purchases or to test the validity of the card details. Cybercriminals use automated software called carding bots to rapidly test multiple card numbers on e-commerce sites to verify which ones are active and which are valid.

  • Credit Card Protection to Bulletproof Against Carding Attacks
  • Examples of Carding Attacks and How to Prevent Against Them
  • Tips for Preventing Against Credit Card Theft
  • The Damages of Carding Attacks

Credential stuffing is a cyber attack method where attackers use automated tools to submit many username-password combinations, typically obtained from previous data breaches, in an attempt to gain unauthorized access to user accounts on various online platforms. Credential stuffing attacks take advantage of the fact that many people reuse passwords across multiple sites.

NFT bots are automated software programs designed to rapidly purchase or interact with Non-Fungible Tokens (NFTs) on various platforms. These bots can give users an advantage by executing transactions faster than manual users, often being used to secure limited-edition or high-demand NFTs before others can.

OpenBullet is a legitimate web-testing software. However cyber criminals exploit OpenBullet to automate credential stuffing attacks and other cyber crimes.

reCAPTCHA is a free security service provided by Google that helps protect websites from automated bot traffic and distinguishes between human and automated access to online sites by presenting challenges that are typically easy for humans to solve but difficult for bots. While widely used, it is no longer effective at stopping modern bot attacks.

  • reCAPTCHA v3 vs. reCAPTCHA v2: Can Bots Still Bypass?
  • Kasada Vs. reCAPTCHA
  • What is the Difference between CAPTCHA and reCAPTCHA?
  • How Click Farms and CAPTCHA Bots Beat CAPTCHA

Scalper bots are automated software programs designed to quickly purchase high-demand items or services online, often before human customers ever have the chance to. Scalper bots are most commonly used to purchase concert tickets, limited-edition merchandise, or new release products only to resell them for inflated prices.

Sneaker bots are specialized automated software programs designed to rapidly purchase limited-release or high-demand sneakers from online retailers bypassing website queues and completing purchases faster than human users can. Resellers often use sneaker bots to purchase sneakers and then resell at a higher price.

Sniper bots are automated software tools used primarily in online auctions where they place a winning bid at the last possible moment giving other bidders little to no time to counter the bid. This allows the sniper bot users to get the items they want, often at a lower price, than they would with traditional bidding.