Automated threats on websites opens up many industries to exploitation of business processes including cyber-fraud. From banks to popular airlines, businesses are poised to lose millions in revenue if they’re not properly protected against these automated attacks. In layman’s terms, automated threats are those undertaken by bots. Thankfully, Distil Networks successfully stops all of the OWASP Top 20 automated threats! Read the following to learn the history behind these threats and how they can exploit your business, undermine your reputation, and affect revenue.
The Open Web Application Security Project (OWASP) established in 2001 to provide a free, and open, software security community. Their mission is to make software security visible, so that individuals and organizations are able to make informed decisions. OWASP provides an unbiased view of software development and does not endorse or recommend commercial products or services.
OWASP Top 10 Vulnerabilities
The OWASP Top 10 Vulnerabilities, last published in 2013, has been a valuable list of criteria by which any Web Application Firewall (WAF) is evaluated, but has a glaring flaw, it only focuses on vulnerabilities in the code, and ignores automated threats.
OWASP Automated Threat Handbook
In late 2015, this flaw was addressed and OWASP released the first Automated Threat Handbook specifically to help organizations better understand and respond to the notable worldwide increase of automated threats from bots. The handbook breaks down the Top 20 automated threats into the following four main categories - Account Credentials, Payment Cardholder Data, Vulnerability Identification, and Other Automated threats.
Complete Coverage with Distil Networks
Distil Networks offers protection from each of the 20 threats listed in the OWASP Automated Threats report. Simply put, all the threats listed are carried out by bots. And at Distil, we block bots!
About the Author
Edward Roberts leads Product Marketing and has over twenty years experience in technology marketing. Previously he worked for Juniper Networks, heading up Product Marketing for the Counter Security team. Before that he ran marketing for Mykonos Software, a web security company.More Content by Edward Roberts