Connect with us
DAPA Banner

Tech

From Bot Signups to Account Takeovers

Published

on

A bot conducting fraud

Modern fraud attacks look like a relay race where different tools and actors handle each stage of the journey from signup to cash-out.

When you only inspect one signal at a time, such as IP or email, attackers simply shift to a different part of the chain and still succeed.

Bot characteristics

Anatomy of a Modern Fraud Chain

A typical attack chain starts with automation to create scale. Attackers use bots and scripts to open large numbers of accounts with minimal human effort, often rotating infrastructure to avoid rate limits and simple bot rules.

Those bots are usually powered by “aged” or compromised emails and leaked credentials so that every account looks like it belongs to a long standing user instead of something created yesterday.

Advertisement

Residential proxies then mask traffic behind real consumer IP ranges, making traffic appear like normal home users rather than data centers or known VPN services.

Once those accounts are established, they shift tactics from automation to slower, human driven sessions to blend into normal usage.

At this point the chain reaches account takeover and monetization, using malware links, phishing, and credential stuffing outputs to log in, change details, and push through high value transactions.

Throughout this lifecycle, the tools are mixed and matched. A single actor may move from a headless browser and proxy at signup to a mobile device emulator and different proxy provider at login, then hand off access to another party who specializes in draining funds or exploiting promo campaigns.

Advertisement

This is exactly why a point in time, single signal check rarely tells the full story

Bot DNA

False Positives from Siloed Checks

When teams lean on one dominant signal, such as IP reputation, false positives become a daily problem. Legitimate users on shared Wi Fi, mobile carrier NATs, or corporate VPNs can inherit the poor reputation of a small number of bad actors on the same ranges, even though their intent is clean.

Blocking by email alone has similar issues, since free webmail domains are used by both sophisticated attackers and completely normal customers.

Identity centric controls on their own also hit a wall. Static data checks, like simple name and document matches, are easy to spoof for synthetic identities built from real data fragments.

Advertisement

Device centric controls that only look for rooted phones or emulators can miss fraudsters operating on seemingly normal devices that have been compromised earlier in the chain. Even bot specific solutions can create blind spots when they work alone.

Once a credential stuffing campaign ends and attackers pivot to manual logins with the same stolen credentials, pure bot tools see only “human” traffic and approve it. The result is a pattern where high risk users are blocked while determined adversaries adapt and slip through.

Multi-Signal Correlation in Practice

Effective fraud defense comes from correlating IP, identity, device, and behavioral signals at every step of the journey instead of evaluating each one in isolation.

An IP that looks slightly suspicious on its own becomes clearly abusive when tied to dozens of new accounts on the same device fingerprint and similar behavioral patterns during the first session.

Advertisement

Likewise, a user with an apparently normal device and clean email reputation can still be high-risk if login behavior reflects credential stuffing patterns or access follows known malware distribution campaigns.

Modern decision engines improve accuracy by weighing hundreds or thousands of data points together rather than enforcing rigid rules on a single attribute.

For organizations, that means unifying what were once separate views. IP intelligence, device fingerprinting, identity verification, and behavioral analytics should feed the same risk model so that each event is scored in context, not as a disconnected log line.

This multi signal approach is the most reliable way to raise the bar for attackers while reducing friction for genuine customers.

Advertisement

Prevent chargebacks. Stop account takeover. Recover revenue. 

Leading enterprises use IPQS data to power their fraud prevention strategies, don’t leave yourself vulnerable. Seamlessly integrate with our APIs to reduce friction, prevent more fraud, and secure your business.

Free Sign Up

Case Study: Stopping Coordinated Signup Abuse

Consider a self service SaaS platform that offers a generous free tier and trials. As the product grows, abuse appears in the form of thousands of signups used to scrape data, test stolen cards, or resell access under the radar.

Early countermeasures rely on blocking certain IP ranges and obvious disposable email domains, but this only dents the problem and begins to impact small teams and freelancers on shared networks.

Advertisement

By shifting to a multi-signal model, the platform starts scoring signups across IP, device, identity, and behavior together.

New accounts that reuse the same device fingerprint with different emails, come from IPs recently seen in automated traffic, or immediately exhibit scripted behavior are grouped into coordinated abuse clusters instead of being evaluated one by one.

This lets the team apply precise responses, such as challenging only high risk clusters with additional verification or silently limiting their capabilities while letting low risk signups proceed without friction.

Over time, feedback from confirmed abuse and confirmed good users trains the scoring model, driving down false positives while pushing organized attackers to spend more effort for less return.

Advertisement

Outpacing Fraud Trends

Attackers are no longer tied to a single tool or weak point in your stack. They combine proxies, bots, synthetic identities, leaked credentials, and malware infrastructure across multiple stages, which means that single signal defenses will always lag behind.

Multi layered approach

To keep pace, fraud teams need correlation across IP, identity, device, and behavior in one coherent risk view rather than a collection of disconnected checks.

From here, the conversation shifts to how to operationalize that unified model, integrate it into existing workflows, and measure its impact on both loss reduction and customer experience.

Book a free consultation with a fraud expert today!

Advertisement

About IPQS

IPQS is a founder-led, self-funded company built on a simple principle: fraud prevention should be driven by real intelligence and a multi-layered approach. From day one, we’ve focused on owning the full lifecycle of our technology—developing and maintaining our own global data network, honeypots, and fraud intelligence specialists. This approach gives our customers a distinct advantage: faster insights, greater accuracy, and complete transparency into how decisions are made. By staying independent, we prioritize long-term innovation over short-term gains, continuously evolving our platform to stop fraud before it starts.

Sponsored and written by IPQS.

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Tech

4 Things Your Nintendo Switch 2 Can Do That Most Owners Don’t Know About

Published

on





People who own the original version of the Nintendo Switch have had a lot of time to discover the various cool things the gaming console could do. You can use it as a TV remote control. You can use it to charge an iPhone. You can surf the web on it. Apart from the unusual uses, there are a number of things you can do on the Switch to enhance your game-playing experience. For example, you can change the button mapping on your controllers, use a mouse or a keyboard, or even play games in portrait mode. While these examples are fun, the list of possibilities got a bit longer with the Nintendo Switch 2.

The release of the Nintendo Switch 2 was highly anticipated because of the eight-year gap in between console versions. As someone who has both, I can attest, almost everything is improved in the Switch 2. The screen is larger and has better display quality. The Joy-Con 2 controllers are magnetically attached and feel more secure. There’s an additional USB-C port on top of the console that lets you charge the device while using the kickstand or plug in additional accessories. Furthermore, there are several hidden new features on the Switch 2 you may not know about.

Advertisement

The Joy-Con 2 controller can be used as a mouse

One of the cool things about the Switch 2 is that you can use a myriad of compatible gadgets with it to make your gaming experience more efficient and enjoyable. In fact, if you’re wondering what it would be like to use an accessory with your gaming console, there’s no need to look further than what’s already in your hand — just detach the Joy-Con 2 controller and start using it as a mouse. It doesn’t matter whether you’re left- or right-handed. Both Joy-Con 2 controllers have a side-rail sensor, so you can use them interchangeably.

There are a few instances wherein the Joy-Con 2’s mouse mode feature could be particularly useful. If you happen to be playing a game that requires intensive menu navigation — such as “Factorio” or “Civilization 7” — it may be more convenient and feel more natural to use a cursor over the Joy-Con 2’s directional pad. It’s also the more portable option as it takes away the need to carry an extra mouse.

Another perk offered by the mouse feature of the Joy-Con 2 is its ease of use. Simply lay the controller flat on its side and the Switch 2 should automatically detect the surface and activate the cursor on some compatible games. For others, you may need to fiddle with the in-game controller settings to get it to work as intended.

Advertisement

There are some limitations to this feature. Since the Joy-Con 2 is thinner than a standard mouse, it can be harder to wield for a longer period of time. It also may not work on certain surfaces — based on testing, mouse mode doesn’t kick on when used on glass or similarly reflective tabletops.

Advertisement

Locally host and stream a supported Switch 2 game you own

GameShare was one of the highly anticipated features of the Nintendo Switch 2 when it was first announced. It allows a Switch 2 user to essentially act as a host, stream a game that is GameShare-compatible, and allow nearby Switch users (including the original version of the Switch) connected to the same Wi-Fi network to play with them, whether or not they own the game themselves. This particular feature is great for families who own multiple Switch consoles as well as game players who have friends visiting and want to play co-op using their own Switch devices. It’s a cost-effective way of enjoying compatible games that offer multiplayer functionality.

To activate GameShare on a supported Switch 2 game, the host needs to launch the game first and find the co-op or multiplayer option in the game’s main menu. Other players can then hit the GameShare icon on the home screen of their respective Switch consoles and find the correct GameShare session to join.

There are a few things to note regarding the GameShare feature. There are two ways to start a GameShare session — locally among consoles connected to the same Wi-Fi network, or online via GameChat. The former is compatible across all versions of the Switch, while the latter is only available for the Switch 2. Consoles with GameChat will need to have the feature set up before they can participate in a long-distance gaming session.

Another important factor to consider is GameShare’s current availability across the Nintendo game catalog. As of this writing, there are 33 Switch 2 games that allow GameShare with local users, such as “Donkey Kong Bonanza,” “Mario Tennis Fever,” and “Pokémon Pokopia.” Meanwhile, there are 23 games that offer GameShare over GameChat among Switch 2 users.

Advertisement

Cap the maximum battery charge

As is the case for most modern devices, battery health matters. A quick way to lose battery capacity over time is keeping your device plugged or charging. If you have your Switch 2 console perennially docked, you are essentially charging it to 100% at all times, which is not advisable if you want your console to last longer. To make your Switch 2 perform better and ensure that you don’t overcharge the gaming device, there’s a new system feature that you can enable that lets you limit its capacity to charge its internal battery to lower than 100%. Here’s how to find it:

  1. Select the System Settings icon on the home screen.
  2. Scroll down to System on the left-side panel.
  3. Enable the toggle next to “Stop Charging Around 80-90%.”
  4. While you’re at it, enable the toggle next to System Battery as well so the number is visible on the home screen.

You will see a message underneath the toggle that warns you that enabling the feature may shorten your playtime when the Switch 2 is used while unplugged, but you may find the reduction of battery degradation worth it in the long term. Also note that even with the feature enabled, the Switch 2 may sometimes charge to a full 100% “to ensure accurate battery-level display.”

Advertisement

Label people on your Friend list

Nintendo recently released Version 22.0.0 of its system update for both the original Nintendo Switch and Switch 2. One of the key additions included is the ability to add notes to users listed in your Friends list. You basically can tack on a label on top of a user’s username on Nintendo.

If you’re a wide-ranging Switch 2 user who enjoys making friends within the games you play as well as in-real-life gaming communities, then you probably have a substantial list of contacts accumulated in your Switch account. Having the ability to include a visual reminder on how you met a user or what games you play with them could make it easier to plan your future games. A good thing about the Add Note feature is that it’s only visible to you, so you can be as descriptive about the people you’re connected with as you want, though people who use your Switch 2 device may be able to see what you’ve written.

To use the new feature, select your profile on the home screen of your Switch 2. Next, select Friend List from the side panel. When you click on a friend’s user tile, you should see the Add Note option underneath their avatar.

Advertisement



Source link

Continue Reading

Tech

Do Emergency Microsoft, Oracle Patches Point to Wider Issues?

Published

on

“Emergency out-of-band fixes issued by enterprise IT giants Microsoft and Oracle have shone a spotlight on issues around both update cycles and patching,” reports Computer Weekly:


Microsoft’s emergency update, KB5085516, addresses an issue that arose after installing the mandatory cumulative updates pushed live on Patch Tuesday earlier this month. According to Microsoft, it has since emerged that many users experienced problems signing into applications with a Microsoft account, seeing a “no internet” error message even though the device had a working connection. This had the effect of preventing access to multiple services and applications. It should be noted that organisations using Entra ID did not experience the issue.

But Microsoft’s emergency patch comes just days after it doubled down on a commitment to software quality, reliability and stability. In a blog post published just 24 hours prior to the latest update, Pavan Davuluri of Microsoft’s Windows Insider Program Team said updates should be “predictable and easy to plan around”.
Michael Bell, founder/CEO of Suzu Labs tells Computer Weekly that Microsoft’s patch for the sign-in bug follows “separate hotpatches for RRAS remote code execution flaws and a Bluetooth visibility bug. Three emergency fixes in eight days does not shout reliability era.”

Oracle’s patch, meanwhile, addresses CVE-2026-21992, a remote code execution flaw in the REST:WebServices component of Oracle Identity Manager and the Web Services Security component of Oracle Web Services Manager in Oracle Fusion Middleware. It carries a CVSS score of 9.8 and can be exploited by an unauthenticated attacker with network access over HTTP.

Advertisement

Source link

Continue Reading

Tech

One UI 8.5 beta brings new life to older Galaxy phones

Published

on

Samsung is widening the reach of its next big Android update, with One UI 8.5 beta now rolling out to a wave of older Galaxy devices. This is not just rolling out to its latest flagships.

After spending months in testing on the Galaxy S25 series, the beta programme is expanding to include last year’s premium phones, foldables and even tablets. Newly supported devices include the Galaxy S24 lineup, Galaxy Z Fold 6 and Flip 6.

In addition, the Galaxy Tab S11 range is supported as well. This is a clear sign Samsung is speeding up its software rollout strategy.

The update is currently available in select regions including the UK, US, Korea and India. Users are able to sign up through the Samsung Members app. Once enrolled, a banner guides you through the process. Notably, Samsung tweaked this process slightly with the One UI 8 release.

Advertisement

This wider rollout lands alongside continued testing on newer hardware. The Galaxy S25 range is already on its eighth beta. Meanwhile, the Galaxy Z Fold 7 and Flip 7 are on their second, suggesting Samsung is getting closer to a stable release.

Advertisement

While Samsung hasn’t detailed every new feature in this phase, One UI 8.5 is expected to refine the experience introduced with One UI 8. Likely, it will focus on performance tweaks, UI polish and AI-driven features rather than a complete overhaul. Furthermore, it also ships pre-installed on the upcoming Galaxy S26 series. Therefore, this gives us a good idea of where Samsung’s software is heading next.

For owners of slightly older Galaxy devices, this is a notable shift. Samsung has been steadily improving its update commitment. Also, bringing beta access to a broader range of devices earlier in the cycle is part of that push.

Advertisement

There’s no exact date for the full release just yet, but Samsung says more devices will join the beta programme in April. So, if your phone isn’t on the list yet, it might not be waiting long.

Source link

Advertisement
Continue Reading

Tech

Dolby sues Snap over video codec patents tied to AV1 and HEVC

Published

on


In a complaint filed in the US District Court for the District of Delaware, Dolby accuses Snap of infringing four video compression patents through Snapchat’s use of both HEVC and AV1. The filing argues that AV1 implementations incorporate proprietary inventions that Dolby never licensed on royalty-free terms and that the…
Read Entire Article
Source link

Continue Reading

Tech

I took a ride in an Nvidia-powered autonomous Mercedes at GTC 2026 – and it’s convinced me this is the future

Published

on

As AI and robotics become an ever-more important presence in everyday life, the use cases are quickly going from science fiction to real life.

One of the most popular areas of interest is autonomous vehicles, self-driving cars able to navigate the roads and get us to our destination without needing to touch the wheel.

Source link

Advertisement
Continue Reading

Tech

Watch Electricity Slosh: Visualizing Impedance Matching

Published

on

It’s one thing to learn about transmission lines in theory, and quite another to watch a voltage pulse bounce off an open connector. [Alpha Phoenix] bridges the gap between knowledge and understanding in the excellent videos after the break. With a simple circuit, he uses an oscilloscope to visualize the propagation of electricity, showing us exactly how signals travel, reflect, and interfere.

The experiment relies on a twisted-pair Y-harness, where one leg is left open and the other is terminated by a resistor. By stitching together oscilloscope traces captured at regular intervals along the wire, [Alpha Phoenix] constructs a visualization of the voltage pulse propagating. To make this intuitive, [Alpha Phoenix] built a water model of the same circuit with acrylic channels, and the visual result is almost identical to the electrical traces.

For those who dabble in the dark art of RF and radio, the real payoff is the demonstration of impedance matching in the second video. He swaps resistors on the terminated leg to show how energy “sloshes” back when the resistance is too high or too low. However, when the resistor matches the line’s characteristic impedance, the reflection vanishes entirely—the energy is perfectly dissipated. It really makes it click how a well-matched, low SWR antenna is crucial for performance and protecting your radio.

Advertisement

[Alpha Phoenix] is a genius at making physics visible. He even managed “film” a laser beam traveling at light speed.

Advertisement

Source link

Continue Reading

Tech

Irish AI start-up Jentic joins OpenClaw push with Jentic Mini

Published

on

The next era of software ‘will be built for agents, by agents’, said Jentic CEO Sean Blanchfield.

Irish AI start-up Jentic is jumping on the OpenClaw frenzy with ‘Jentic Mini’, a free, open source, self-hosted offering for developers building with the product.

The months-old OpenClaw project has taken the developer world by storm, but security issues associated with letting personal agents access computers has already led to a number of different iterations from big-name brands such as Nvidia, with its open source stack NemoClaw, and Anthropic, which recently integrated OpenClaw’s text features into Claude.

Jentic Mini also markets itself to be safer to use in real-world software environments. Jentic said that the API execution layer gives developers a better way to govern how agents access tools, APIs and workflows to help reduce risks that come with broad and unmanaged credential exposure.

Advertisement

Jentic Mini is available on the start-up’s website, as well as on GitHub. It can also be used with other general-purpose agents including NemoClaw.

With more than 10,000 APIs, agents created using Jentic Mini will come with a “machine-usable map” of the tools and workflows that can be used, while enabling a more structured and controlled way to connect agents to real systems, the company said. Jentic’s standard model is available as a verified connector in Claude.

“The next era of software will not be built for humans. It will be built for agents, by agents,” said Sean Blanchfield, the CEO and co-founder of Jentic.

“Jentic Mini gives developers a free, open source foundation for that shift, connecting general-purpose agents to real systems through an AI-curated catalogue of more than 10,000 APIs and workflows. We want to make it dramatically easier to deploy agents that do real work.”

Advertisement

Jentic became the first Irish company to be selected for the AWS generative AI accelerator last year. The selection followed a €4m pre-seed raise in 2024, one of the largest in Ireland that year.

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

Source link

Advertisement
Continue Reading

Tech

I’m finally playing Eastshade, and it’s turned me into a travelling painter who really cares about artistic composition

Published

on

Chill, walking simulator-cross-traveling painter game Eastshade has been in my backlog for a while now. If memory serves, it’s because I found mention of it having wonderful virtual landscapes during a time when I was writing about that aspect of games.

From the Backlog

Every gamer has a backlog — and that’s no different for us at TechRadar Gaming. From the Backlog is a series about overdue first-plays, revisiting classics, returning to online experiences, or rediscovering and appreciating established favorites in new ways. Read the full series here.

Now, years on, I’ve finally made it into the world of EastShade and have fully embraced my role as a visiting painter for hire, intent on fulfilling some last requests by their late mother.

Advertisement

Source link

Advertisement
Continue Reading

Tech

This app makes your MacBook moan when you slap it, and it's going viral

Published

on


The idea came from social media. Catapano posted a short Instagram clip of himself slapping his MacBook, complete with sound effects and a mock groan. When the clip unexpectedly went viral, he decided to turn the gag into an app.
Read Entire Article
Source link

Continue Reading

Tech

Bluesky leans into AI with Attie, an app for building custom feeds

Published

on

The team from Bluesky has built another app — and this time, it’s not a social network, but an AI assistant that allows you to design your own algorithm, create custom feeds, and, one day, vibe-code your own app.

At the Atmosphere conference over the weekend, Bluesky’s former CEO, Jay Graber, now chief innovation officer, and Bluesky CTO Paul Frazee, presented the AI app, called Attie, for the first time. Conference attendees will become the initial beta testers for the new experience, which leverages Anthropic’s Claude under the hood to create an agentic social app built on Bluesky’s underlying protocol, the AT Protocol (or atproto for short).

“It’s a new product — it’s not a part of the Bluesky app,” explains interim CEO Toni Schneider in an interview. (In addition to his CEO role, Schneider is a partner at Bluesky backer True Ventures.) “We’ve launched a lot of things inside Bluesky — Starter Packs and custom feeds, and all those kinds of things. This is a standalone product, and it’s the first one that’s built by Jay’s new team.”

ScreenshotImage Credits:Attie from Bluesky

With Attie, anyone will be able to build their own custom feed just by typing in commands in natural language, the same as if they’re chatting with any other AI chatbot. To use the app, people will sign in with their Atmosphere login (meaning their login for any app that runs on atproto, which includes Bluesky). Attie will immediately understand what you’ve been talking about, what sort of things you like, and more, because Bluesky and the wider ecosystem are open systems that share data across apps.

You can ask Attie questions, like what posts you might like to see or repost, and you can use the app to curate your own custom feed, personalized to you.

Advertisement

“You control it, you shape it, without having to write code or know how to set up these feeds,” Schneider says. “It’s the beginning of just having a lot more people be able to build on top of the Atmosphere.”

Plus, he adds, “It is an AI product, but it’s an AI product that’s very people-focused … We think AI is a very powerful technology, but we want to make sure that we use it to build things that really benefit people.”

Techcrunch event

San Francisco, CA
|
October 13-15, 2026

Advertisement

At launch, Attie can be used to build and view these feeds, which will later become available to you within Bluesky or any other atproto app. Over time, the plan is to allow Attie’s users to vibe-code their own social apps as well as build tools for other people.

ScreenshotImage Credits:Attie from Bluesky

Schneider says that Graber and her team began working on the app a few months ago, which was around the same time she decided to return to building, instead of running the company.

“I think she realized that there was so much more that she wanted to build, and just doing the CEO job kept her busy, and she felt like she wanted more time,” Schneider tells TechCrunch. “As she spent more time, [and] got freed up, I think it became clear that this is her happy place. She’s an amazing leader and visionary, and we want her building more things and not worrying about operating the company,” he says.

Advertisement

Graber says today, AI is being used by the major platforms to serve themselves, not their users, by trying to increase people’s time spent in their apps, harvesting data, and controlling their algorithms.

“We think AI should serve people, not platforms,” Graber said in her announcement of Attie. “An open protocol puts this power directly in users’ hands. You can use it to build your own feeds, create software that works the way you want it to, and find signal in the noise.”

Graber’s decision to once again focus on protocol and product was followed by the company’s announcement that it now has $100 million in additional funding from a round that closed last year. The team hopes that news serves as a signal to the wider community that Bluesky will continue to be around.

“It means we have three-plus years of runway, which is great. That means stability and security for the rest of the ecosystem,” Schneider tells TechCrunch. It also means that Bluesky’s team has time to tackle the bigger challenges ahead, which include adding privacy controls to the protocol and finding a way to monetize the social network of 43.4 million users.

Advertisement

One thing that Schneider assures us is not in the works, however, is any crypto integration — despite the financial backing from multiple crypto investors. That’s something that had worried some Bluesky users, who feared the app would be filled with crypto scams or become a payment tool.

“It’s the kind of investors who were attracted to crypto because of its decentralization, and they were investing in things built on the blockchain that were super decentralized,” Schneider says of Bluesky’s backers in the crypto space. “This is decentralized social, so it fits those who are invested to believe in the platform and the ecosystem opportunity.”

Instead, the company may experiment with other means of monetization. The team hasn’t yet decided if Attie will ultimately require a fee, as it’s only a private beta for the time being. Other ideas being batted around include subscriptions and hosting services for those who want to host their own communities on the protocol.

Schneider, the former CEO of Automattic, the home of publishing platform WordPress.com, sees the potential for the Atmosphere as being similar to WordPress in this way.

Advertisement

“At the center of [the Atmosphere] is a completely open system, so anybody can participate,” he says. “You can have all of these independent, decentralized pieces that work together. With WordPress, that turned into a huge ecosystem with billions of dollars — over $10 billion a year, now — flowing through it.”

Schneider continues, “So it’s gotten very big, even though it’s completely decentralized. And this is what we’re hoping for, for the Atmosphere to have that similar ability for lots of these apps and services to coexist and work together and build an ecosystem.”

Source link

Advertisement
Continue Reading

Trending

Copyright © 2025