From Research

Fraud Beat 2018

The Fraud Beat 2018 – The Latest Attacks and Trends

Share Button

The threat has never been greater – attacks are reaching unprecedented levels of complexity and criminals are ever more innovative in their fraud strategies. Read more

Machine Learning Algorithms Explained - Support Vector Machines

Share Button

In our series, Machine Learning Algorithms Explained, our goal is to give you a good sense of how the algorithms behind machine learning work Read more

Logistic Regression

Machine Learning Algorithms Explained - Logistic Regression

Share Button

In our series, Machine Learning Algorithms Explained, our goal is to give you a good sense of how the algorithms behind machine learning work Read more

AI vs AI

AI vs AI – Can Predictive Models Stop the Tide of Hacker AI?

Share Button

Long ago, the introduction of the internet moved crime from physical to digital locations, where anti-fraud actors play a high-stakes game of detection and prevention Read more

Machine Learning Naive Bayes

Machine Learning Algorithms Explained - Naive Bayes Classifier

Share Button

In our series Machine Learning Algorithms Explained, our goal is to give you a good sense of how the algorithms behind machine learning work, as well as the strengths and weaknesses of different methods.  Read more

Malicious Extension

Video Blog: Malicious Browser Extension

Share Button

Cyber fraud is always evolving, and criminals are always looking for new ways to monetize vulnerabilities in online systems. The latest trendy target: Browser Extensions. Read more

Malicious Extension

Ominous “Live Weather” Browser Extension Manipulates Users' Browsing

Share Button

The “Colombia Weather Live” extension appeared on multiple browsers, including Google Chrome and Mozilla Firefox, and was downloaded by more than 10,000 users. In the video, we talked about the main actions of the attack Read more

DMARC

DMARC: Which Government Agencies Get a Passing Grade?

Share Button

It’s long been widely accepted throughout the security industry that email is the number one attack vector exploited by fraudsters. While enterprises have been working to seal off this channel, government entities have been slower to act. Read more

Machine Learning K-Means

Machine Learning Algorithms Explained – K-Means Clustering

Share Button

In our series, Machine Learning Algorithms Explained, our goal is to give you a good sense of how the algorithms behind machine learning work, as well as the strengths and weaknesses of different methods. Read more

Random Forests

Machine Learning Algorithms Explained - Random Forests

Share Button

In our series, Machine Learning Algorithms Explained, our goal is to give you a good sense of how the algorithms behind machine learning work Read more