Latest Fraud Schemes in Retail, Hospitality, and Gaming
Up to 99 percent of the traffic on retail and eCommerce login forms is due to account takeover (ATO) attempts. In this webinar, Shape Security’s Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs with actual use cases from retail, hospitality, telco, and gaming industries. Learn about what attackers really do with compromised accounts from Shape Security’s Intelligence Center.
Key Takeaways:
- Hear about the size of the automation threat facing the retail industry and the associated losses
- Learn how social engineering is used more than ever as a fraud tool to leverage PII against individuals and the business they patron
- Discover how credential stuffing attacks are used to steal gift cards, commit return fraud, and test stolen credit cards
RecordedOct 16 201934 mins
Your place is confirmed, we'll send you email reminders
Dan Woods, VP Shape Intelligence Center and Former FBI Agent
One of the most common ways cybercriminals perform account takeovers is via credential stuffing.
To learn more about this threat, Dan Woods, former FBI Special Agent, and VP Shape Intelligence will demonstrate how the Selenium Webdriver tool is used to perform credential stuffing attacks.
Jarrod Overson, Director of Engineering at Shape Security
While the holidays bring us an excess of joy and hot chocolate, security teams are faced with a substantial increase in cyber attacks. Hot products in demand bring scammers, scalpers, and bad bots.
Join us for this live webinar as Jarrod Overson, Director of Engineering at Shape Security, breaks down three of the most popular and costly cyber attacks and what you can do to keep these attacks from ruining the holidays.
Jarrod Overson, Director of Engineering at Shape Security
While the holidays bring us an excess of joy and hot chocolate, security teams are faced with a substantial increase in cyber attacks. Hot products in demand bring scammers, scalpers, and bad bots.
Join us for this live webinar as Jarrod Overson, Director of Engineering at Shape Security, breaks down three of the most popular and costly cyber attacks and what you can do to keep these attacks from ruining the holidays.
Dan Woods, VP Shape Intelligence Center and Former FBI Agent
How do cybercriminals defeat the “we don’t recognize your device” response from a website? Genesis: The digital fingerprint marketplace. While getting access to Genesis is invite-only, the Shape Intelligence team found a way in and we’d love to show you what’s behind the curtain!
Join us for this brief webinar as Dan Woods, VP of Shape Intelligence Center and former FBI agent, gives you a step-by-step walk-through of the Genesis marketplace in under 10 minutes.
Smriti Kawal Jaggi, Threat Intel Analyst at Shape Security
Up to 99 percent of the traffic on retail and eCommerce login forms is due to account takeover (ATO) attempts. In this webinar, Shape Security’s Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs with actual use cases from retail, hospitality, telco, and gaming industries. Learn about what attackers really do with compromised accounts from Shape Security’s Intelligence Center.
Key Takeaways:
- Hear about the size of the automation threat facing the retail industry and the associated losses
- Learn how social engineering is used more than ever as a fraud tool to leverage PII against individuals and the business they patron
- Discover how credential stuffing attacks are used to steal gift cards, commit return fraud, and test stolen credit cards
Amy DeMartine, Vice President, Research Director at Forrester
Most website visitors aren’t humans, but instead bots–or, programs built to do automated tasks. While there are good bots like chatbots and search engines, there are a lot more bad bots, that malicious attackers use to commit fraud while simultaneously killing customer experience.
In this webinar, Amy DerMartine, Vice President, Research Director at Forrester, will discuss the effects of bad bots and how to combat these bad actors.
You will learn:
- How bots are quickly evolving to mimic human behavior or are being used alongside real humans
- The targets and various types of attacks from bad bots
- What organizational issues you should consider and tools to use to manage bot traffic
Major attacks, breaches, exploits, and malware are nearly a daily occurrence. The problem is two-fold, attacks are getting cheaper to perform and the value of stolen credentials is increasing daily. In this session, Jarrod Overson, Director at Shape Security, will reveal how cheap modern attacks have become and how cybercriminals bypass defenses like CAPTCHAs and browser fingerprints.
You will learn:
Why attackers are hyper-incentivized due to the dirt-cheap cost of attacks
How attacks have evolved over time and insights into where attacks are going
What cybersecurity and development teams must change to reflect the realities of attackers that won’t quit
According to the FBI report in 2014, botnets have caused over $9 billion in losses to U.S. victims and over $110 billion in losses globally. Bots are rapidly proliferating globally at a rate of 18 machines per second. These bots are being used by organized crime to carry out website attacks such as credential stuffing attacks leading to large-scale account hijacking and widespread online fraud. Attend this webinar to learn about bots, botnets, and automated attack ecosystem from Shape’s Shuman Ghosemajumder, who is also the former head of product management for click fraud protection at Google.
Why you should attend:
- Learn about the evolving bot and botnet landscape
- Understand how bots are used to carry out website attacks and fraud
- Evaluate strategies to protect your website from bots
Sumit Agarwal, Co-Founder & Vice President of Products and Nwokedi Idika, Ph.D., Senior Research Scientist
"Use of Stolen Credentials" is this year's #1 most common threat, according to Verizon's latest Data Breach Report. In this webinar with Shape Security's threat research team, you will learn how stolen credentials sold on the darknet are fueling these attacks—particularly in the retail, travel, hospitality and financial services industries. These attacks lead to breaches, each of which can cost an enterprise millions of dollars.
Why you should attend:
-Understand credential stuffing attacks and how they lead to account takeover
-Evaluate business risks for your organization
-Learn about the workflow and common tools used to execute credential stuffing attacks
Shape Security protects Fortune 500 websites from malware, botnets and scripts. Shape protects websites using real-time polymorphism to make websites a moving target. Shape stops the cause of the most serious breaches – web automation.
Latest Fraud Schemes in Retail, Hospitality, and GamingSmriti Kawal Jaggi, Threat Intel Analyst at Shape Security[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]34 mins