Fraud is a constant thorn in the side of many enterprises. It affects not only their operations and their revenue…
Trust and Safety
Closed Groups 101
The internet has changed the way we communicate and interact with each other, particularly when it comes to connecting with people through social media and alternative platforms…
Better Context Leads to Better Detections and Outcomes
Better context leads to better detection and therefore better outcomes. Better outcomes are the result of world-class intelligence…
Seven Cyber Predictions from Nisos for 2023
U.S. capitalism and the private sector are complex systems, where cybersecurity is often overlooked until a breach or compromise occurs…
Short and Distort Schemes Becoming More Mainstream
Whether it’s “short and distort” or “pump and dump” schemes, these types of misinformation crimes happen more than people understand, and they are typically very organized…
Social Media Spoofing, Fraud, and Company Security
Social media is one of the most powerful tools available to organizations and business leaders to reach and influence a target audience…
5 Ways Your Cybersecurity Team Can Help Avoid Fraud and Abuse
As the world moves increasingly online, so too do the opportunities for fraudsters and malicious actors…
Phishing Emails: What They Are and How to Spot Them
Phishing scams are one of the most common and costliest ways that fraudsters try to gain access to computer systems…
Click Fraud: How It’s Affecting Businesses and What You Can Do to Prevent Abuse
If you’re in the business of buying or selling online advertising, you may have been affected by click fraud. Click fraud, or ad fraud…
Identifying and Disrupting Platform Abuse in the Gig-Economy
The Challenge A technology company noticed a disturbing increase in malicious activity across their platform. Unknown individuals were selling bots that claimed to automate interactions with their platform and provide those that purchased the app an advantage over...
Threat Intelligence to Remediate Platform Abuse
The Challenge A publicly traded technology company (the Client) with thousands of global employees maintains a premier business unit application platform regularly abused by eCrime and cyber espionage actors. The Client requested Nisos’ expertise in threat...
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.