Building a Zero Trust Strategy: A Fundamental Guide

In today's digital landscape, traditional security measures are no longer sufficient to protect sensitive data and systems from evolving cyber threats.

Itay Kozuch
13 Jun 2023
payment-security

Faster Payments, Faster Fraud: Examining the Challenges of Faster Payment Systems’ Mass Adoption in India, the UK, Malaysia, and Australia

The adoption of faster payment systems has revolutionised transaction processes in countries such as India, the UK, Malaysia, and Australia.

Nathan Close
05 Jun 2023
fraud-protection

Notable Fraud Trends in 2022: Insights from Outseer FraudAction’s Threat Intelligence Team

As the Cyber Threat Intelligence Team Lead at Outseer, I have the privilege of leading a highly skilled team of multilingual experts who have immersed themselves in the world of fraud and cybercrime.

Yuval Horn
05 May 2023
fraud-protection

Get Your Organization Ahead of ChatGPT-Enabled Phishing, Scamming, and Cybercrime

During our May 3rd webinar, I discussed the intersection of cyberfraud and AI and unveiled what we do at Outseer to help protect businesses and consumers alike.

Maximilian Gebhardt
20 Apr 2023
fraud-protection

Fraud Monitoring: Why Every Company Needs It

Wondering about fraud monitoring? We explain what fraud monitoring is, how to accomplish it, and the business benefits for your company.

Mark Crichton
18 Aug 2022
fraud-protection

Bust-Out Fraud: How it Works, How to Prevent It

In bust-out fraud, perpetrators build a trustworthy credit history for a significant time to take a large credit in the future and don't pay it back.

Armen Najarian
17 Aug 2022
payment-security

The Metaverse: Fraud’s Next Frontier?

Cybercriminal efforts to harvest account logins and payment information in the metaverse signal that we should all brace for a rise in phishing attacks.

Armen Najarian
02 Aug 2022
fraud-protection

MITM: How To Deal With Man-in-the-Middle Cyberattacks

MITM attacks or Man-in-the-Middle attacks are cybercrimes in which perpetrators intercept and exploit communications or data transmissions between two parties. Read on to learn how to protect your organization from this fraudulent action.

Armen Najarian
14 Jul 2022
fraud-protection

The Dangers of Credential Stuffing and How to Prevent It

Credential stuffing is when a bot, script, or other automation exploits a series of stolen login credentials (usernames and passwords) to infiltrate user accounts. Read on to learn how to protect your organization from this fraudulent action.

Jim Ducharme
29 Jun 2022
fraud-protection