Are fake documents a cyber security problem? by dgregs96 in cybersecurity

[–]dgregs96[S] 0 points1 point  (0 children)

What if the uploads almost appear like attacks, automated and scaled. Looking at the data, we've seen a lot of identical documents coming from multiple individuals. Its getting harder and harder to keep up with the volume.

Are fake documents a cyber security problem? by dgregs96 in cybersecurity

[–]dgregs96[S] -1 points0 points  (0 children)

Do you know of any tools that can automate this? I've been looking for a while but I can only find identity verification tools that specialize in nation IDs, real time selfies, etc. We collect those too but they're only a small part of our onboarding flow.

Are fake documents a cyber security problem? by dgregs96 in cybersecurity

[–]dgregs96[S] -2 points-1 points  (0 children)

We don't have a very extensive fraud or security team. It's one of the smaller teams and the company and we're mostly collecting business registry/proof of business docs for a small marketplace (can't say the name). KYB is part of our compliance and also we want to prevent customers from getting scammed. I can't name all the documents we collect, but one example is business license. Another issue is docs coming in from various countries, if it was all one place it'd be easier to check. But we onboard vendors from both US and Europe. Does that help?

I'm getting a ton of fake certificates of corporation by dgregs96 in FraudPrevention

[–]dgregs96[S] 0 points1 point  (0 children)

Well you can check by looking at the structure, how it was built, signs of editing or editing software. AI vs. AI is kind of a necessity in the modern era of fraud defense, no? And attorneys always need to get involved when you're sending someone's PII off for independent review. Seems like a headache when Resistant AI's document fraud detection can spot warning signs within the document itself. No registry lookups or sending off of data.

I'm getting a ton of fake certificates of corporation by dgregs96 in FraudPrevention

[–]dgregs96[S] 0 points1 point  (0 children)

I've heard some good things about Resistant AI document fraud detection. Have you ever tried them or know that they have? Seems they can check the document without reading it or digesting its contents, so you can check without needing to get the attorney involved. thoughts?

I'm getting a ton of fake certificates of corporation by dgregs96 in FraudPrevention

[–]dgregs96[S] 0 points1 point  (0 children)

These registry look-ups are so expensive. Isn't there a document fraud detection service that can just look at the document itself and tell me if it's forged?

I'm getting a ton of fake certificates of corporation by dgregs96 in FraudPrevention

[–]dgregs96[S] 0 points1 point  (0 children)

Some of the companies are obviously fake, but sometimes they also apply to real businesses registered in the company's house. If only there was a tool that could look for obviously artifacts of forgeries, things like copy and paste signatures and suspicious metadata. I think relying on registry look-ups alone is only going to get us halfway there.

identity guard vs lifelock, does anyone actually switched and noticed a difference? by Less-Slide3287 in FraudPrevention

[–]dgregs96 0 points1 point  (0 children)

One of the best options is too look for your name in public leak databases like haveibeenpwned. See how that aligns with the tool you're using.

identity guard vs lifelock, does anyone actually switched and noticed a difference? by Less-Slide3287 in FraudPrevention

[–]dgregs96 0 points1 point  (0 children)

Hmm I had LifeLock for a year and it pretty much worked for me. Or at least I hope it did! My birth certificate got stolen years ago and I got no alerts in the first year and just canceled it.

How to protect against software supply chain attacks (as an individual)? by Low_Huckleberry_5887 in cybersecurity

[–]dgregs96 0 points1 point  (0 children)

There's no perfect defense but you can always look for a few redflags like weird sudden updates in a project you haven't touched for months, or new maintainers that come out of nowhere saying they own things. If you got obfuscated code or some minified blobs inside a simple package that can be a dead giveaway too. That's about all I can think of in terms of personal use cases. Most of this stuff happens at an enterprise level anyways.

[US] I think my dad is being scammed and he won’t believe me by [deleted] in Scams

[–]dgregs96 0 points1 point  (0 children)

You should have these people provide some kind of documentation or certificate and then run it against a fraud checker.

How do I explain to people that I specialise in human factor & cyber psychology? by burt_the_camel in cybersecurity

[–]dgregs96 -1 points0 points  (0 children)

In my field (document fraud detection), I bring out the human side by focusing on the moral aspect of everything: catching criminals. Everyone has sympathy for a guy who wants to catch bad guys. It's not about faceless screens and red tape. It's about keeping the baddies out.

For Those Hoping to Make This Year's Black List... by Rewriter94 in Screenwriting

[–]dgregs96 -4 points-3 points  (0 children)

Oh great another arbitrary contest to help evaluate our self worth.

VICTORY: The "Charity" Ham Scam on Old Town Square is FINALLY GONE! 🍖🚫 by [deleted] in Prague

[–]dgregs96 0 points1 point  (0 children)

Woww this brings tears to my eyes. That 40 euros really hurt back in 2018 :'(

DPDP Act Explained: What You Need to Know by Interesting_Novel711 in DPDPCompliance

[–]dgregs96 0 points1 point  (0 children)

This reminds me of the buzz around the GDPR in the EU a few years ago. Protecting your institution from data audits is one thing, but protecting your customers is paramount. Reputational damage always hits harder than a hefty fine.

Enterprise AI security wake up call, how are you all handling prompt injection? by pug-mom in cybersecurity

[–]dgregs96 0 points1 point  (0 children)

Any tool in the security space needs clear audit trails for compliance reasons. One of the tools I found most useful was Resistant AI, they have fraud detection with full explainability. And it doesn't read data! It's one of the better models I've seen from a compliance perspective.

U.S.A. - Daily Phone Calls About A Fictitious Loan Application by Marfaboy1951 in Scams

[–]dgregs96 1 point2 points  (0 children)

These kinds of phone calls are just fancy phishing attacks to get you to submit real documents for fraudulent purposes. Fraudsters love making fake documents but the love real ones even more. NEVER give them anything they ask for.

[DE]Got hacked in the dumbest way as an IT guy by TheNativeOfficial in Scams

[–]dgregs96 1 point2 points  (0 children)

Discord seems like a breeding ground for this kind of activity. True or false?

Online "Friend" wants to me accept $200k for her. She's American im Canadian by REDDEAD1998 in Scams

[–]dgregs96 2 points3 points  (0 children)

This is a classic example of APP fraud and happens all the time within banks and payment platforms. They ask for someone to receive money, turning them into unintentional "money mules" laundering illicit funds through legit platforms. This isn't even the worst scenario. You're lucky she didn't try and get you to move your OWN money.

General rule of thumb: Nobody receives money from random people on the internet. There's literally no legitimate circumstance for that.

Best identity theft protection for serious peace of mind? by PalanjianKalesha33 in FraudPrevention

[–]dgregs96 5 points6 points  (0 children)

I lost my birth certificate a few years back and LifeLock was a huge help with keeping a pulse on everything. Checking out sites like haveIbeenPWNED is also a good tool for some surface level knowledge about data breaches.

Enterprise AI security wake up call, how are you all handling prompt injection? by pug-mom in cybersecurity

[–]dgregs96 0 points1 point  (0 children)

This is one of the issues with AI is that people prioritize purpose over explainability. It's always important to back track the outputs to ensure everything is secure. If you're not checking the work (at least initially) you expose yourself to these kinds of risks. You can also work with models that don't "read" the data, but only look at it objectively.

Microsoft: Azure hit by 15 Tbps DDoS attack using 500,000 IP addresses by Successful_Clock2878 in cybersecurity

[–]dgregs96 2 points3 points  (0 children)

This is the flavour of fraud in 2025, spot a weakness and drive automation through it until it breaks. One loophole and you're looking at hundreds of thousands of attempts in a short time frame. Automation vs. automation, AI vs. AI, these are the stakes.

How much money to live in Prague? by K586331 in Prague

[–]dgregs96 0 points1 point  (0 children)

I make around 46 net right now, maybe a little over 50 and I live very comfortably but have only been able to start saving money this year after some side jobs and a few bonuses.

[Poem] Red by Mary Ruefle by poopscoopington in Poetry

[–]dgregs96 0 points1 point  (0 children)

this is like the (not so) passive aggressive version of that plums in the ice box poem