Preventing Money Mules: The Impact of Behavioral Analytics in Financial Security

Preventing Money Mules: The Impact of Behavioral Analytics in Financial Security - Preventing Money Mules The Impact of Behavioral Analytics in Financial Security

Criminals engage in a variety of illicit activities, such as drug sales, illegal arms trade, and human trafficking, often reaping substantial profits. However, to capitalize on these gains, they need to integrate their earnings into legitimate financial systems. This is where the use of money mules comes into play. Detecting and mitigating the presence of […]

How to Protect Your Customers from SIM Card Attacks: The New Identity Theft Threat

SIM banner image

From OTPs and two-factor authentication to registering users’ trusted devices, knowing your users’ mobile phone numbers is an indispensable component of keeping user accounts secure. But what happens when someone fraudulently gains access to a user’s phone number?  This is not a hypothetical scenario but a growing threat that many smartphone users are unaware of. […]

How to Protect Your Users from Xenomorph

How to Protect Your Users from Xenomorph - Transmit Blog Header Image 1258x826 xenomorph 3

A new Android banking trojan called Xenomorph is gaining popularity among threat actors who are using the malware to steal credentials from over 450 apps, including cryptocurrency wallets, email services and over 50 European banking apps, Spanish apps in particular. Xenomorph, which was first seen in late February, was distributed through the official Google Play […]

Uncovering the Power of AI: How ChatGPT is Changing the Game in Multiple Industries

Uncovering the Power of AI: How ChatGPT is Changing the Game in Multiple Industries - Transmit Blog Header Image 1258x826 ChatGPT

ChatGPT (Chat Generative Pre-trained Transformer) is a chatbot developed by OpenAI based on the GPT-3.5 large language model. It has a remarkable ability to interact in conversational dialogue form and can provide responses that appear surprisingly human — generating massive excitement from users, who are leveraging its capabilities in a range of new ways that […]

Detecting Registration Bots: A Case Study

Detecting Registration Bots: A Case Study - Transmit Blog Header Image 1258x826 Reg Bot

The rise of registration bots The past few years have witnessed a massive increase in new account fraud across a wide range of digital platforms. From fake profiles on dating apps that send phishing messages to legitimate users to bogus online gaming accounts designed to accrue in-game assets, to fraudulent financial accounts created to open […]

How to Detect Social Engineering Account Takeovers 

How to Detect Social Engineering Account Takeovers  - Transmit Blog Header Image 1258x826 template3

Account takeovers (ATOs) resulting from social engineering are commonplace. This is likely because they’re easy to execute even for novice fraudsters. Sprawling communities of scammers gather to share successful methods, sell credentials and provide money mule services to each other. According to Javelin Research’s annual “Identity Fraud Study: The Virtual Battleground” report, account takeover increased […]