about-me variable
Netacea invites you to their event

Dissecting a Malicious Bot Attack

About this event

Malicious bot attacks are becoming more frequent and high profile, with a slew of scalper bot attacks hitting the headlines since 2020, as attackers target in-demand items such as the PlayStation 5 and even Covid-19 vaccine appointments.

According to Netacea’s recent survey, 46% of enterprise organizations experienced an account takeover attack in 2020. 58% of these businesses stated that the attacks had a known financial impact.

Join Matthew Gracey-McMinn and Cyril Noel-Tagoe from Netacea’s Threat Research team for a deep dive into how credential stuffing techniques lead to mass account takeover on some of the world’s busiest websites, mobile apps and APIs.

In this webinar, we discuss:

  • The scale of the account takeover attack problem, zoning in on credential stuffing and how these attacks are executed, with a live demonstration using real attacker tools
  • The makeup of attacker tooling, explaining how they bypass defenses and how they maximize the efficiency of their attacks
  • The impact on various sectors, including retail, telecommunications and financial services

Hosted by

  • Team member
    Matthew Gracey-McMinn Head of Threat Research @ Netacea

    Matthew is an experienced Cybersecurity professional. In his current role he researches and investigates the impact of malicious bots on online businesses and their customers. His articles have been published in Security Magazine, Tech Radar and Security Info Watch.

  • Team member
    YD T
    Yasmin Duggal Technical Writer and Webinar Manager @ Netacea


Netacea has re-invented bot detection, creating new detection techniques that can detect and categorise more malicious bot activity with lower false positives than other techniques, constantly preventing malicious attacks.