Each month, the Cequence Security Research team shares API threat statistics and unique threat patterns that they have observed. The latest Cequence Security State of API Security Activity Monthly Bulletin is out and Cequence Security is seeing an unusual uptick in traffic from China spiking at a 200% increase.
The percentage of overall traffic from China was observed across multiple organizations in the US and EMEA. The Cequence Threat Research team tracked and tracked a sophisticated recon effort as a threat actor abused business logic to attempt to commit fraudulent purchases on stolen credit cards through automated account creation. The research also observed malicious infrastructure providers showing potentially new bulletproof proxy vendors appearing.
You can read the report here, and it does make for some interesting reading.
Like this:
Like Loading...
Related
This entry was posted on May 19, 2022 at 8:50 am and is filed under Commentary with tags Cequence Security. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
New Security Research Discovers Unusual Uptick in Malicious Traffic from China: Cequence Security
Each month, the Cequence Security Research team shares API threat statistics and unique threat patterns that they have observed. The latest Cequence Security State of API Security Activity Monthly Bulletin is out and Cequence Security is seeing an unusual uptick in traffic from China spiking at a 200% increase.
The percentage of overall traffic from China was observed across multiple organizations in the US and EMEA. The Cequence Threat Research team tracked and tracked a sophisticated recon effort as a threat actor abused business logic to attempt to commit fraudulent purchases on stolen credit cards through automated account creation. The research also observed malicious infrastructure providers showing potentially new bulletproof proxy vendors appearing.
You can read the report here, and it does make for some interesting reading.
Share this:
Like this:
Related
This entry was posted on May 19, 2022 at 8:50 am and is filed under Commentary with tags Cequence Security. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.