Account takeover fraud: 5 steps for protecting your customers

Account takeover fraud: 5 steps for protecting your customers

According to research by the Aite Group, financial institutions are facing a 64% uptick in account takeover attacks than before the pandemic. This number is expected to rise further as the digital ecosystem expands, enlarging the surface area culpable to attack. Account takeover fraud is one of the most common ... Read More
custom data folder

Logo Detection Using Yolo v5 and Pytorch

YOLO refers to the paper published in May 2016. The YOLOv5, a version of the model in the You Only Look Once (YOLO) family of computer vision models, is on Pytorch and all the previous models used the darknet implementation. Our goal is to use the YOLO for logo detection, even ... Read More
Account takeover fraud: 5 steps for protecting your customers

Account takeover fraud: 5 steps for protecting your customers

ATO is one of the most common types of online fraud. This article discusses the different methods of ATO and 5 steps your organization should take to protect against it ... Read More
cybersecurity CPU

Best of 2021 – 5 NFT Scams you need to know – NFT Scams Part-1

| | Crypto, cryptocurrency, nft
Wherever there is crypto, there are giveaway (/airdrop) scams. In these scams, scammers target NFT enthusiasts by offering them free NFT tokens ... Read More
What Every CISO Should Do to Fight Typosquat Attacks?

What Every CISO Should Do to Fight Typosquat Attacks?

Attackers can use typosquatting domains to host a wide variety of scams. Typosquatting domains target vendors, customers and empoyees ... Read More
Scam targeting Rarible users - 1

NFT Scams Part 2: Typosquatting Attacks targeting NFT marketplace users

The problem of typosquatting has been ever-existent in the world of online fraud. Almost every brand and industry we monitor is a target of these attacks. Brands operating in the NFT space are no exception ... Read More