top of page


The Critical Visibility Gap Between Marketplace Data and Checker, Real-Time Data Intelligence
Across the payments ecosystem, criminals need validated, “live” cards because stolen cards are the fuel for almost every form of online payment fraud. The sooner they confirm which cards work, the sooner they can monetize them and fraud can hide more easily. These cards include traditional consumer Visa and Mastercard branded cards from issuing banks, private label, commercial, and even gift cards. But here’s the problem: many organizations, including banks, don’t see these
Don Bush
1 day ago3 min read


From Cyber Sleuthing to Global Spotlight, Lawrence Baldwin’s Story Featured in BBC Podcast Series
We’re thrilled to share some exciting news: our founder, Lawrence Baldwin , is featured in a gripping new BBC World Service podcast series that dives deep into one of the most remarkable true stories in cyber history. Listen to Cyber Hack “Evil Corp”: https://www.bbc.com/audio/brand/w13xtvg9 About the Series The BBC’s Cyber Hack series “Evil Corp” takes listeners inside the high-stakes world of international cybercrime, where hackers, governments, and investigators cross
Don Bush
Nov 51 min read


myNetWatchman Launches the Travel Credential Abuse Index
The First Industry Benchmark on Cyber Threats Targeting Global Travel Brands Savannah, GA, October 21, 2025 — myNetWatchman today announced the release of the Travel Credential Abuse Index (TCAI) Report , a first-of-its-kind benchmark tracking credential-based cyberattacks across airlines, hotels, online travel agencies (OTAs), and car rental companies. The report delivers unprecedented visibility into how credential abuse has evolved over the past two years, revealing that
Don Bush
Oct 292 min read


MFA Isn’t a Fortress: Why Compromised Emails Undermine Account Security
If you’ve worked in fraud prevention or cybersecurity, you’ve probably heard it a thousand times: “Just turn on multi-factor...
Don Bush
Oct 84 min read


From Trusted to Threat: The Hidden Risks of Verified Accounts
Why Continuous Monitoring Is Essential for Account Protection Business leaders and fraud managers invest significant resources in...
Don Bush
Oct 13 min read


Email Hygiene: A Hidden Lever in Reducing Fake Accounts & Improving Business Metrics
Every executive decision relies on trustworthy numbers. Metrics like CAC (Customer Acquisition Cost), CLTV (Customer Lifetime Value),...
Don Bush
Sep 243 min read


Sleeper Accounts Are Waking Up, Right on Cue for iPhone 17 Pre-Orders & Holidays
Apple just opened iPhone 17 pre-orders (stores launch September 19), and history has shown that fraudsters treat new-phone hype and...
Don Bush
Sep 173 min read


The Real Economics of Credential Stuffing: Low Success, High Impact
(Excerpts from the recently published Special Report, “ The Economics of Credential Stuffing Attacks and Account Takeover Fraud ” by...
Don Bush
Sep 102 min read


Is Your Business a Target for Credential Stuffing?
Credential stuffing is a serious cyberattack because it’s cheap, easy to scale, and takes advantage of the common problem of people...
Don Bush
Sep 51 min read


Mind the Gap in Your Verification Analysis
Bridging the Divide Between Breach Data and Actionable Intelligence It has been a year since the massive AT&T data breach shook the...
Don Bush
Aug 272 min read


The Rising Threat of Business Email Compromise
Cybercrime is evolving faster than ever, and Business Email Compromise (BEC) stands out as one of the most insidious threats. Unlike...
Don Bush
Aug 211 min read


Webinar Recording – Using Live Data to Stop ATO
According to the 2025 Verizon Data Breach Incident Report, credential abuse (i.e., credential stuffing, account takeover attacks, etc.)...
Don Bush
Aug 133 min read


Evolving Landscape of Cyber Threats Necessitates Advanced Risk Assessment for Cyber Insurers
Cyber insurance is a critical tool for businesses to mitigate financial losses from cyberattacks. However, insurers' traditional approach...
Don Bush
Jul 311 min read


Big Mac, Fries, and 64 million Records To Go Please
Seriously, McDonald's? A Wake-Up Call for Enterprise Security Leaders. To all CISOs, cybersecurity managers, and fraud prevention experts...
Don Bush
Jul 164 min read


Pig Butchering Scams: A CISO’s Guide to Mitigating a Sophisticated Cyber Threat
According to the Global Anti-Scam Alliance ( GASA ) and Chainalysis Reports , "pig butchering" scams, which involve luring victims into...
Karen Simmons
Jul 94 min read


The Achilles' Heel of Online Security: Why Passwords Leave Companies Vulnerable
In our digital-first world, passwords, combined with an email address or User ID, are the primary gatekeepers to vast amounts of...
Don Bush
Jun 253 min read


The Hidden Vulnerability: How Compromised Credentials Fuel Ransomware and Beyond
In today's interconnected digital landscape, the security of a company's sensitive data is only as strong as its weakest link. While...
Don Bush
Jun 114 min read


Email: More Dangerous than Ever
Most businesses and people assume email is secure. It is not. Every year millions of compromised email accounts are used by fraudsters....
Don Bush
Jun 43 min read


From Boasting to Breach: The Escalating Risk of Your Online Life
Imagine Johnny, an AI expert, famous for his globetrotting talks, boasting about racking up over a million Delta miles. Unbeknownst to...
Grace Howard
May 283 min read


myNetWatchman Welcomes Madhura Belani as Chief Product Officer
Belani to Drive Innovation in ATO Prevention and Enhanced Cybersecurity myNetWatchman, a leader in real-time compromised credential...
David Montague
May 212 min read
bottom of page
