KEYNOTE: The Power of Data Interchange to Investigate Application Attacks
Shape threat research recently partnered with one of our hospitality customers to investigate a mysterious case involving online bookings that were producing a spike in no-shows. An innovative automation attack was uncovered, impacting not only this customer, but a number of brands across the hospitality industry – including members of the RH-ISAC community. Shape brought […]
Read more