From Research

The Evolution of Advanced Threats: The 2019 Faces of Fraud Survey

Share Button

The latest edition of Cyxtera’s Faces of Fraud report, conducted with assistance from the Information Security Media Group (ISMG), collected responses from over 150 financial security leaders about fraud attack and protection trends. Read more

Why It’s Still Time to Kill the VPN

Share Button

Financial institutions aiming to implement a holistic security strategy must ensure that they focus not only on their external anti-fraud efforts, but also on their internal security. Read more

Lucifer Trojan

Meet Lucifer: A New International Trojan

Share Button

The cat-and-mouse game between cybercriminals and security analysts never stops. Every so often, the mouse (in this case, represented by some kind of malware) pulls out front at a pace that catches that cat (the security solution) off guard. Read more

Deep Learning

Hunting Malicious Certificates with Deep Learning

Share Button

Seeing the signature green padlock and “https” in the browser bar means one thing for most internet users: safety. However, is this sense of security justified?  Read more

Fraud Beat 2018

The Fraud Beat 2018 – The Latest Attacks and Trends

Share Button

The threat has never been greater – attacks are reaching unprecedented levels of complexity and criminals are ever more innovative in their fraud strategies. Read more

Machine Learning Algorithms Explained - Support Vector Machines

Share Button

In our series, Machine Learning Algorithms Explained, our goal is to give you a good sense of how the algorithms behind machine learning work Read more

Logistic Regression

Machine Learning Algorithms Explained - Logistic Regression

Share Button

In our series, Machine Learning Algorithms Explained, our goal is to give you a good sense of how the algorithms behind machine learning work Read more

AI vs AI

AI vs AI – Can Predictive Models Stop the Tide of Hacker AI?

Share Button

Long ago, the introduction of the internet moved crime from physical to digital locations, where anti-fraud actors play a high-stakes game of detection and prevention Read more

Machine Learning Naive Bayes

Machine Learning Algorithms Explained - Naive Bayes Classifier

Share Button

In our series Machine Learning Algorithms Explained, our goal is to give you a good sense of how the algorithms behind machine learning work, as well as the strengths and weaknesses of different methods.  Read more

Malicious Extension

Video Blog: Malicious Browser Extension

Share Button

Cyber fraud is always evolving, and criminals are always looking for new ways to monetize vulnerabilities in online systems. The latest trendy target: Browser Extensions. Read more