FIs are seeing attacks with very high transaction volumes. Some are obvious and get blocked. Others hide behind data aggregators and power large-scale credential stuffing. When blocking improves, attackers often switch to manual steps to slip past controls. This webinar reviews common automated abuse, shows case studies of how those attacks were mitigated, and ends with a deep dive on an advanced manual fraud case, including the key signals to watch and controls that worked.
Presenter:
Adeolu Ogunnoiki | Data Scientist III | F5
© Copyright 1999 - FS-ISAC, Inc. All Rights Reserved.