Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How bail bond scams are using AI to target families

Bail bond scams are getting smarter with AI. Here's how to spot them before they cost you thousands. A call saying someone you love has been arrested and needs money ASAP can feel so real that you act before you think. Learn how bail bond scams work and what to watch for to help protect you and your family from falling for the scheme. Getting a call about bail isn’t something most people prepare for, and that’s exactly what scammers count on.

The ABCs of KYT: How this key process combats payment fraud

Banks, payment processors and fintechs have long relied on Know Your Customer (KYC) processes to verify identity and assess the risk of doing business with the customer during onboarding, and on Know Your Business (KYB) processes to validate business legitimacy. But today, that’s no longer enough.

Bot Management vs. ThreatX: How to Stop Business Logic Fraud

Bot Management vs. ThreatX: How to Stop Business Logic Fraud In this video, A10 Networks security expert Gary Wang explores the critical differences between dedicated bot management platforms and the ThreatX approach. If you are concerned about protecting your web applications from sophisticated fraud, this breakdown is essential viewing. Using a real-world scenario—a convenience store referral program being exploited by bad actors—Gary explains how attackers bypass standard defenses to commit "business logic" fraud.

New Partnership With Friends Against Scams: Together Against Cybercrime

We're excited to announce our new partnership with Friends Against Scams, a National Trading Standards initiative working to protect people from scams across the UK. Together, we've created a cybercrime factsheet to help individuals understand the threats they face online, who is most at risk, and where to turn for support.

How to Detect Phishing Before It Happens: Moving Beyond User Awareness

By the time a phishing email lands in an inbox, the attacker’s infrastructure has already been live for hours. That’s not a hypothetical. Zimperium’s 2024 research found that 60% of newly created phishing domains receive a TLS certificate within the first two hours of registration. The site is credentialed, hosted, and ready before most security teams have any signal it exists.

FBI: Americans Lost More Than $20 billion to Fraud Last Year

Cyber-enabled crimes cost Americans nearly $21 billion in 2025, a 26% increase from the previous year, according to the FBI’s latest Internet Crime Report. Phishing, extortion, and investment scams were the most commonly reported attacks, with AI-related scams driving some of the costliest losses. Phishing was the top attack vector, with these attacks leading to more than $215 million in losses. Notably, AI-assisted business email compromise (BEC) attacks cost victims more than $30 million.

How to stop fraud and cyberattacks from becoming liquidity ordeals

When it comes to real-time payments, fraud moves fast — but liquidity stress can move even faster. A fraud or cyberattack can quickly become a liquidity event when it disrupts settlement funds, triggers abnormal transaction flows or forces payment services offline. That is why banks, payment processors and instant payment networks need real-time visibility into transaction activity, settlement exposure and emerging operational risk.

This Sophisticated Scam Should Be a Warning To All Companies

Scams are becoming more sophisticated over time, but this latest scam should be a wake-up call to all organizations and employees as to how far some scammers will go to damage your organization or its stakeholders. On March 31, 2026, malicious hackers hijacked the development account of a lead maintainer of a popular open source product called Axios used by many companies. It has over 100 million downloads a week. Note: The Axios involved here is not Axios, the news media company.

How to Detect Man-in-the-Middle Attacks: Indicators, Methods, and Detection Gaps

Most MITM attacks don’t announce themselves. No alerts fire, no certificates visibly break, and no users report anything unusual. By the time the interception is discovered, credentials or session tokens are already in attacker hands. Knowing how to detect man-in-the-middle attacks requires looking across multiple layers: network traffic, DNS resolution, TLS certificate integrity, and session behavior.