Blog Virtual SIM Cards: What They Are & How Fraudsters Use Them How and why do fraudsters use virtual SIM cards?
Podcasts Fraudster - Anonymous G on Beating 2FA and OTP We speak with Anonymous G to learn how fraudsters bypass 2FA and OTP verification.
Podcasts Anonymous A on the Basics of Account Takeover Fraud Account Takeover Attacks (ATO) are performed by specialist fraudsters.