Research
Publications
Identity muling and techniques to combat the rise of second-party fraud
As identity verification systems improve at detecting deepfakes and synthetic identities, fraudsters are increasingly turning to identity muling, a form of second-party fraud that relies on real people willingly sharing their identities or completing verification on behalf of bad actors. This white paper examines how identity muling works, why it is difficult to detect, how it differs from identity theft and other muling schemes, and which risk signals and defense strategies organizations can use to identify and disrupt identity mule operations.
January 23, 2026
Threat Domain Partitioning and Sorted Rejection Labeling: Benchmarking for Adversarial Environments
Structural differences in fraud detection make conventional classification metrics both hard to compute and often misleading. We introduce a practical framework that defines business-aligned benchmarks that are cheaper to label, stable under performative drift, and foundational for systematic and iterative fraud model development
October 15, 2025
Modernizing Know Your Business (KYB) with online credibility signals
Traditional Know Your Business (KYB) checks confirm a company’s legal existence but often miss signs of real-world legitimacy or fraud. This white paper explores how integrating online credibility signals from a business’s website, social media presence, and customer reviews adds vital context to KYB. By combining registry data with digital footprint analysis, organizations can verify businesses more holistically, accelerate onboarding, meet regulatory standards, and reduce fraud risk.
October 07, 2025
Understanding and verifying digital identity
Digital identity connects who people are in the real world with how they interact online, combining personal data, behavioral patterns, and technological signals to establish authenticity. As digital ecosystems expand and AI-driven threats evolve, strong identity verification is essential to preserve trust, prevent fraud, and enable secure online engagement.
July 08, 2025
Navigating global age verification laws in the digital era
As regulatory bodies worldwide strengthen age verification and data privacy regulations, organizations must balance compliance with seamless user experiences. Understanding emerging laws and implementing adaptable, privacy-conscious verification systems are key to protecting minors, maintaining trust, and meeting evolving global standards.
October 29, 2024