attacks
Overview
Credential Stuffing
Fake Accounts
Credit Application Fraud
Gift Card Cracking
Scraping
Application DDOS
AGGREGATOR THREAT SURFACE
Most commonly used attack tool for
Credential Stuffing.
Download Brief
Solutions
Overview
Shape Recognize
F5 DEVICE ID+
Shape AI FRAUD ENGINE
Shape Enterprise Defense
Shape Device ID
Starbucks Combats Credential Stuffing and Account Takeover.
View Full Video
Customers
Finance
Retail
Tech
Government
Travel
RESOURCES
NEWS
BLOG
WEBINARS
EVENTS
Case Studies
What Your Login Success Rate Says About Your Credential Stuffing Threat
View Blog
COMPANY
Leadership
CAREERS
PARTNERS
View Press Release
Contact
SCHEDULE DEMO
FREE VIRTUAL EVENT
App security & fraud summit
All Webinar Sessions
Shape Security Predictions 2020 Report: Emerging Threats to Application Security
Mike Plante
| CMO, Shape Security
Watch Video
Credential Stuffing 2020: Latest Attack Trends and Tools
Jarrod Overson
| Director of Engineering, Shape Security
Watch Video
Compromised Credentials, Customer Satisfaction, and Your Bottom Line
Smriti Jaggi
| Threat Intelligence Analyst, Shape Security
Watch Video
Manual Fraud Fueled by Genesis & Magecart: Beyond Automated Attacks
Dan Woods
| VP Shape Intelligence Center and Former FBI Agent
Watch Video
Magecart & Other Application Code Attacks: Digital Skimming, Fraud & PII Theft
Wesley Hales
| Director, Partner Solutions, Shape Security
Watch Video
Critical Infrastructure Attacks: Between Apocalypse and Reality
Tara Seals
| Senior Editor, Threatpost
Watch Video
Attacker Economics: Hacker Cost vs Value
Jarrod Overson
| Director of Engineering, Shape Security
Watch Video