Saturday, May 3, 2025
HomeCyber Security NewsGoogle Launches reCAPTCHA v3 - A New Way to Stop Bot Traffic

Google Launches reCAPTCHA v3 – A New Way to Stop Bot Traffic

Published on

SIEM as a Service

Follow Us on Google News

Google launches reCAPTCHA v3 which returns a score based on the action in the website, which help’s webmaster in protecting the site against both.

Google acquires reCAPTCHA in the year 2009, from the time of acquisition Google made a number of changes and continuously evolved its technology.

reCAPTCHA v1 – Shows a challenge distorted text and ask to type the text into a box.

- Advertisement - Google News

reCAPTCHA v2 – Requires users to click on the checkbox indicating the user is not a robot.

reCAPTCHA v3 – Allows you to verify the interactions is legitimate or not without any user interaction.

With reCAPTCHA v3, Google introduced a new concept called “Action”—a tag and it doesn’t interrupt users.

Google recommended adding reCAPTCHA in multiple pages, it can identify the pattern of attackers more accurately by looking at the activities across different pages on your website.

With reCAPTCHA admin console, you can get a full overview of reCAPTCHA score distribution and a breakdown for the stats of the top 10 actions on your site reads Google blog post.

The Google reCAPTCHA v3provides you a list of suspicious user interaction and tells you the score.

Three Ways reCAPTCHA v3 Calculates Score

First, you can set a threshold that determines when a user is let through or when further verification needs to be done

Second, you can combine the score with your own signals that reCAPTCHA can’t access—such as user profiles or transaction histories.

Third, you can use the reCAPTCHA score as one of the signals to train your machine learning model to fight abuse.

If reCAPTCHA v3 returns the score 1.0 it is like a human interaction and 0.0 is likely a bot, it learns by seeing real traffic on your site.

reCAPTCHA v3

Related Read

unCaptcha to Break reCaptcha System of Defense in 5.42 Seconds

Security Researcher Breaks Google’s ReCaptcha v2 using Google’s Own Tool

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Subscription-Based Scams Targeting Users to Steal Credit Card Information

Cybersecurity researchers at Bitdefender have identified a significant uptick in subscription-based scams, characterized by...

RansomHub Taps SocGholish: WebDAV & SCF Exploits Fuel Credential Heists

SocGholish, a notorious loader malware, has evolved into a critical tool for cybercriminals, often...

Hackers Weaponize Go Modules to Deliver Disk‑Wiping Malware, Causing Massive Data Loss

Cybersecurity researchers uncovered a sophisticated supply chain attack targeting the Go programming language ecosystem...

Hundreds of Fortune 500 Companies Have Unknowingly Employed North Korean IT Operatives

North Korean nationals have successfully infiltrated the employee ranks of major global corporations at...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Subscription-Based Scams Targeting Users to Steal Credit Card Information

Cybersecurity researchers at Bitdefender have identified a significant uptick in subscription-based scams, characterized by...

RansomHub Taps SocGholish: WebDAV & SCF Exploits Fuel Credential Heists

SocGholish, a notorious loader malware, has evolved into a critical tool for cybercriminals, often...

Hackers Weaponize Go Modules to Deliver Disk‑Wiping Malware, Causing Massive Data Loss

Cybersecurity researchers uncovered a sophisticated supply chain attack targeting the Go programming language ecosystem...