Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Stolen Creds

Below you will find reports with the tag of “Stolen Creds”

image from Insider Hacks: How To Catch And Prosecute Fraudsters

Insider Hacks: How To Catch And Prosecute Fraudsters

From the report, “Partnering with retailers for over a decade to detect and prevent online fraud has unearthed many insights about eCommerce criminals. One insight is that while detecting and preventing fraudster attacks is good, it is even better to catch and prosecute. But gathering evidence and building a case can be complex. Kount asked Skip Myers and Chad Evans to share best practices and firsthand success stories with building, submitting cases and engaging with law enforcement to not only catch fraudsters, but to bring them to justice.”

(more available)
Added: February 16, 2019
image from Insider Hacks: Fighting Fraud for Online Games

Insider Hacks: Fighting Fraud for Online Games

Scott Adams has been at the front lines fighting fraud in the world of online games as former Vice-Chair Merchant Board at Payments Ed Forum, and former Director of Fraud and Risk Management at Riot Games. For nearly four years, he led his group to greatly reduce fraud and increase account security for the millions of people who play League of Legends worldwide. Scott’s experience and expertise includes Payment Processing, Anti-Fraud/Chargeback Management, and Connecting the Marketing/Business Departments with Customer Service and Information Technology Departments (Cross-Departmental Communications). Kount asked him to share his industry expertise and insights for combating card-not-present (CNP) fraud in the Online Games market.

(more available)
Added: February 16, 2019
image from Quarterly Threat Report: Q1 2018

Quarterly Threat Report: Q1 2018

From the report, “This quarter’s report covers three main areas of concern for the modern IT defender: • First, credential theft, reuse, and subsequent suspicious logins are—today— the most commonly reported significant incident we’re seeing across both small (<1,000 endpoints) and large organizations (≥1,000 endpoints). • Second, the DDoS landscape just got a lot more interesting with the debut of a new technique using misconfigured—and plentiful—memcached servers. • Finally, we take a look at the increasing levels of SMB and Cisco SMI attacker probes and attacks, where the former continues to define the “new normal” level of background malicious behavior around Windows networking, and the latter begins to bring shape to this relatively new attack vector targeting core router infrastructure.” Read on to find out more.

(more available)
Added: February 9, 2019
image from Carding and The Digital Gaming Industry

Carding and The Digital Gaming Industry

This report offers insight into fraud in the gaming industry beginning with stolen credit cards being used with Fortnite.

Added: January 31, 2019
image from Q2 2018 Gaming & Gambling Report

Q2 2018 Gaming & Gambling Report

The ThreatMetrix Gaming and Gambling Cybercrime Report is based on actual cybercrime attacks in Q2 2018 that were detected by the ThreatMetrix Digital Identity Network (the Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Q1 2018 Cybercrime Report

Q1 2018 Cybercrime Report

The ThreatMetrix Cybercrime Report: Q1 2018 is based on actual cybercrime attacks from January – March 2018 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Cybercrime Report 2017: A Year In Review

Cybercrime Report 2017: A Year In Review

This report offers insight into the cybercrime events of 2017.

Added: January 30, 2019
image from Q4 2017 Cybercrime Report

Q4 2017 Cybercrime Report

The ThreatMetrix Cybercrime Report: Q4 2017 is based on actual cybercrime attacks from October – December 2017 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from 2017 Q3 Cybercrime Report

2017 Q3 Cybercrime Report

The ThreatMetrix Cybercrime Report: Q3 2017 is based on actual cybercrime attacks from July – September 2017 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications. • The Network provides visibility and insight into traffic patterns and emerging threats. The Network analyzes close to two billion transactions per month, over 51% of which originate from mobile devices. • These transactions are analyzed for legitimacy based on hundreds of attributes, including device identification, geolocation, previous history and behavioral analytics. • The Network and its real-time policy engine provide unique insight into users’ digital identities, even as they move between applications, devices, and networks. • ThreatMetrix customers benefit from a global view of risks, based on these attributes and rules that are custom-tuned specifically for their businesses. • Attacks discussed are from “high-risk” transactions scored by ThreatMetrix customers.

(more available)
Added: January 30, 2019
image from 2017 Q2 Cybercrime Report

2017 Q2 Cybercrime Report

Cybercrime continues to grow, with organizations being attacked more than ever before. ThreatMetrix detected and stopped 144 million attacks this quarter and 300 million bot attacks. The complex, networked nature of cybercrime attacks can be seen in the following key trends analyzed this quarter: • The evolution of emerging economies in the cybercrime landscape as identity data trickles down to all regions of the globe following large-scale breaches • The regional variations in attack vector trends, with South America emerging as a hub for new account origination fraud • The emergence of highly organized criminal gangs targeting multiple organizations within the ThreatMetrix Network • The rise in mobile attack rates as attackers turn their attention towards the growing mobile economy

(more available)
Added: January 30, 2019
image from 2017 Q1 Cybercrime Report

2017 Q1 Cybercrime Report

The ThreatMetrix Cybercrime Report: Q1 2017 is based on actual cybercrime attacks from January – March 2017 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications. The Network provides visibility and insight into traffic patterns and emerging threats. The Network analyzes close to two billion transactions per month, over 45% of which originate from mobile devices. These transactions are analyzed for legitimacy based on hundreds of attributes, including device identification, geolocation, previous history and behavioral analytics. The Network and its real-time policy engine provide unique insight into users’ digital identities, even as they move between applications, devices, and networks. ThreatMetrix customers benefit from a global view of risks, based on these attributes and rules that are custom-tuned specifically for their businesses. Attacks discussed are from “high-risk” transactions scored by ThreatMetrix customers.

(more available)
Added: January 30, 2019
image from 2017 Gaming and Gambling Cybercrime Report

2017 Gaming and Gambling Cybercrime Report

This report offers these key insights: 49% of all transactions analyzed in gaming and gambling come from a mobile device, Identity spoofing remains the biggest threat to the industry, and Automated bot attacks can account for around half of daily gaming/gambling traffic during periods of peak attacks.

(more available)
Added: January 30, 2019
image from Q4 2016 CyberCrime Report

Q4 2016 CyberCrime Report

The ThreatMetrix Cybercrime Report: Q4 2016 is based on actual cybercrime attacks from October – December 2016 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from 2017 Cybercrime Report: Travel and Entertainment Industry DeepDive

2017 Cybercrime Report: Travel and Entertainment Industry DeepDive

This report from ThreatMetrix compiles their 2017 Cybercrime report in such a way that they offer unique insight into the travel and entertainment industry and how cybercrime is impacting that arena.

(more available)
Added: January 30, 2019
image from Q3 2016 CyberCrime Report

Q3 2016 CyberCrime Report

The ThreatMetrix Cybercrime Report: Q3 2016 is based on actual cybercrime attacks from July 2016 – September 2016 that were detected by the ThreatMetrix Digital Identity Network (The Network) during real time analysis and interdiction of fraudulent online payments, logins and new account applications.

(more available)
Added: January 30, 2019
image from Cybercrime Report: Gaming And Betting

Cybercrime Report: Gaming And Betting

Using intelligence from the ThreatMetrix Digital Identity Network, gaming and gambling companies can accurately differentiate between responsible users and problem gamblers / fraudsters in real time.

(more available)
Added: January 30, 2019
image from Retail & Ecommerce Threat Landscape Report

Retail & Ecommerce Threat Landscape Report

In this research report, IntSights and Riskified will show the scope and severity of the current threat and fraud landscape for retailers. We will share key research findings and common examples of retail fraud and show how fraudsters commonly target retailers using their digital assets and the dark web. Additionally, we will explore the latest threats to the retail sector, such as tools, techniques and real-life examples, and we will close with our predictions for 2019.

(more available)
Added: January 25, 2019
image from 10 Things About The Dark Web You Probably Didn't Know

10 Things About The Dark Web You Probably Didn't Know

Mention the dark web and many people summon imagery of a massive, mysterious online criminal underground, where all manner of products and information are bought, sold, and traded, hidden away from the prying eyes of the public and law enforcement. But is that really what it’s like, or is that just cybersecurity marketing hype?

(more available)
Added: January 25, 2019
image from Sentry MBA: A Tale On The Most Widespread Used Credential Stuffing Attack Tool

Sentry MBA: A Tale On The Most Widespread Used Credential Stuffing Attack Tool

This report describes the Sentry MBA, a credential stuffing attack tool, which has become the most popular cracking tool among threat actors in recent months. Among the reasons for its popularity, the Sentry MBA hacking tool is freely and publicly available, extremely effective, and easy to operate.

(more available)
Added: December 5, 2018
image from Identity Security Trends In The Mobile Era

Identity Security Trends In The Mobile Era

To better understand the mindset and priorities of those who make security decisions for mobile devices in the workplace, Ping Identity conducted a mobility survey in partnership with Gatepoint Research. The results shed light on four main insights into the top challenges and motivations for enterprise mobile initiatives.

(more available)
Added: November 27, 2018
image from The Art Of War: Using Economics To Defeat Cyber Crime

The Art Of War: Using Economics To Defeat Cyber Crime

The ancient Chinese general Sun Tzu said “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” While it’s unrealistic to think we can win every battle against cyber criminals, Sun Tzu’s words have a lot to offer. The problem that every privacy and security team faces is how to defend on every possible front with finite resources and budget. And the simple answer is, you don’t have to.

(more available)
Added: November 24, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)