Account Takeover Fraud , Application Security & Online Fraud , Events

Embracing Collective Protection to Thwart Bot-Based Attacks

HUMAN CEO Tamer Hassan on How Bots Are Being Used by Both Attackers and Defenders
Tamer Hassan, co-founder and CEO, HUMAN Security

Bots have become an important tool for modern cybercrime. A bot is used somewhere in the attack cycle in more than three-quarters of security incidents.

See Also: The Operationalization of Threat Intelligence Programs

HUMAN Security co-founder and CEO Tamer Hassan called account takeover "the gateway drug to all other forms of fraud and abuse" and said bots have exacerbated what was already a serious problem (see: Human Takes on Media Malvertising With Clean.io Acquisition).

"Bots are typically used in a few ways," Hassan said. "One, when they've infected machines - using those machines to behave like millions of humans and using stolen credentials to get access to these accounts. And then once they have access, they can automate a wide array of things."

In this video interview with Information Security Media Group at RSA Conference 2023, Hassan also discusses:

  • How the proliferation of bots has helped cybercriminals make more money;
  • How hackers use bot-based brute forcing and credential stuffing in attacks;
  • Why bot-based attacks have been so pervasive in the advertising tech space.

Before starting HUMAN, Hassan founded Compel Data Technologies, a software development and consulting company focused on big data and business intelligence solutions. Prior to that, he worked at the U.S. Air Force for more than nine years.


About the Author

Michael Novinson

Michael Novinson

Managing Editor, Business, ISMG

Novinson is responsible for covering the vendor and technology landscape. Prior to joining ISMG, he spent four and a half years covering all the major cybersecurity vendors at CRN, with a focus on their programs and offerings for IT service providers. He was recognized for his breaking news coverage of the August 2019 coordinated ransomware attack against local governments in Texas as well as for his continued reporting around the SolarWinds hack in late 2020 and early 2021.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.