top of page


The Critical Visibility Gap Between Marketplace Data and Checker, Real-Time Data Intelligence
Across the payments ecosystem, criminals need validated, “live” cards because stolen cards are the fuel for almost every form of online payment fraud. The sooner they confirm which cards work, the sooner they can monetize them and fraud can hide more easily. These cards include traditional consumer Visa and Mastercard branded cards from issuing banks, private label, commercial, and even gift cards. But here’s the problem: many organizations, including banks, don’t see these
Don Bush
2 days ago3 min read


Sleeper Accounts Are Waking Up, Right on Cue for iPhone 17 Pre-Orders & Holidays
Apple just opened iPhone 17 pre-orders (stores launch September 19), and history has shown that fraudsters treat new-phone hype and...
Don Bush
Sep 173 min read


Mind the Gap in Your Verification Analysis
Bridging the Divide Between Breach Data and Actionable Intelligence It has been a year since the massive AT&T data breach shook the...
Don Bush
Aug 272 min read


The Rising Threat of Business Email Compromise
Cybercrime is evolving faster than ever, and Business Email Compromise (BEC) stands out as one of the most insidious threats. Unlike...
Don Bush
Aug 211 min read


Webinar Recording – Using Live Data to Stop ATO
According to the 2025 Verizon Data Breach Incident Report, credential abuse (i.e., credential stuffing, account takeover attacks, etc.)...
Don Bush
Aug 133 min read


Evolving Landscape of Cyber Threats Necessitates Advanced Risk Assessment for Cyber Insurers
Cyber insurance is a critical tool for businesses to mitigate financial losses from cyberattacks. However, insurers' traditional approach...
Don Bush
Jul 311 min read


Pig Butchering Scams: A CISO’s Guide to Mitigating a Sophisticated Cyber Threat
According to the Global Anti-Scam Alliance ( GASA ) and Chainalysis Reports , "pig butchering" scams, which involve luring victims into...
Karen Simmons
Jul 94 min read


The Hidden Vulnerability: How Compromised Credentials Fuel Ransomware and Beyond
In today's interconnected digital landscape, the security of a company's sensitive data is only as strong as its weakest link. While...
Don Bush
Jun 114 min read


From Boasting to Breach: The Escalating Risk of Your Online Life
Imagine Johnny, an AI expert, famous for his globetrotting talks, boasting about racking up over a million Delta miles. Unbeknownst to...
Grace Howard
May 283 min read


From Inbox to Outbreak: The BEC and FTF Epidemic
#emailfraud, #bec, #emailreputation
Grace Howard
May 143 min read


Verizon Report: Proactive Credential Screening - Your First Line of Cyber Defense
#credentialscreening, #ATOprevention, #VerizonDBIR, #cybersecurity
Don Bush
May 73 min read


Anyone Can Get Phished
#phishing #itcanhappentoanyone #fraudprevention
Jen Baldwin
Apr 22 min read


Stolen Miles, Shattered Dreams: How Account Takeover Wreaks Havoc
#travel, #loyaltyprogram, #airlines, #hotels, #carrental, #ATO
Don Bush
Mar 123 min read


Bruce Lee Got it Right, “Be Like Water” or “Don't Block IP Addresses”
#identityintelligence #bestpractice #fraudprevention #brucelee, #belikewater
Jen Baldwin
Feb 262 min read


Please Don't Block My Grandma Because My Fridge is Hacked! (Or, Why IP Blocking is Dumb)
Story time! Gather 'round and gain some wisdom.
#identityintelligence #bestpractice #fraudprevention
Jen Baldwin
Feb 52 min read
bottom of page
