Using Attacker Tools to Gain the Upper Hand on ATOs

Account takeover (ATO), is a form of online identity theft where bad actors gain access to a person’s financial, eCommerce, or other accounts and use those accounts to execute fraudulent transactions. ATO continues to be in the forefront of retail CISO interests and concerns. : Depending on the sophistication of the attack, ATO attacks can…

Read More

Modern Solutions for Mitigating Fraud in a Shifting Economic Climate

Prior to the COVID-19 pandemic, 63% of consumers said they referenced their mobile phones as a resource while shopping in stores1. Today, due to the lack of face-to-face interactions resulting from COVID-19, we’re seeing a rapidly accelerated adoption of eCommerce as a marketplace. The week following the pandemic declaration, eCommerce traffic increased 23% and it’s…

Read More

Top 5 Tips to Protect User Data

If there’s one thing that never changes in cybersecurity, it’s this: threat actors will always look for the path of least resistance to gain access to a victim’s network. While companies that collect and maintain personally identifiable information (PII) or protected health information (PHI) are often the preferred targets of threat actors, attackers will target…

Read More