Connect with us

Hi, what are you looking for?



ThreatMetrix Launches Intelligence Network to Detect Malicious Web Activity

ThreatMetrix, a provider of technologies to help organizations thwart cybercrime, announced a new intelligence network containing threat data and information that can be used to identify transactions and Website visitors as potentially malicious.

ThreatMetrix, a provider of technologies to help organizations thwart cybercrime, announced a new intelligence network containing threat data and information that can be used to identify transactions and Website visitors as potentially malicious.

The new ThreatMetrix Global Trust Intelligence Network is a repository of information that organizations can use to screen prior transactions and site visitors, as well as to authenticate customers and remote employees, ThreatMetrix said Wednesday.

ThreatMetrix Logo

The Network, as it is called for short, can analyze more than 350 million monthly website transactions and login access attempts for cybercriminal activity, such as spoofed browser settings, a proxy to hide one’s true location, or a past history of high risk behavior. The network can provide insight into both positive and negative behavior for devices and online personas using more than 400 billion data points, ThreatMetrix said. 

The Network offers organizations with real-time screening for online visitors using collaborative intelligence culled from thousands of websites and transactions, according to the company. The Network analyzes “the context and insights of prior visitor behavior and how they relate to incoming transactions,” said Alisdair Faulkner , chief products officer of ThreatMetrix, in a statement. With the information, ThreatMetrix can “uncover telltale signs of fraudsters and hackers, including devices infected with malware, virtual private network (VPN) detection, Man-in-the-Browser (MitB) detection, phishing detection, bots and automated attacks,” Faulkner said.

Many existing authentication products put customers through a process that can feel intrusive, such as requiring additional personal information, or elaborate with multiple steps, to prevent fraudulent or risky transactions. ThreatMetrix designed the platform so that customers, employees, and other “safe visitors” are not “inconvenienced” while high-risk visitors are identified based on their behavior and blocked.

“Web fraud is the new spam problem of this decade, except it is more profitable and far more lethal to revenues, brands, business continuity and national security,” said Faulkner.

Even if the visitor spoofed the browser settings or used a proxy to hide the true location, the network can flag the visitor for additional scrutiny. The assessment is based on previous risky behavior, such as being associated with high-risk behavior across other networks, or is associated with an abnormal number of personas, ThreatMetrix noted.

Advertisement. Scroll to continue reading.

“Instead of drowning underneath the weight of big data, ThreatMetrix customers can automatically pinpoint Web fraud and compromised users, while reducing friction for trustworthy visitors,” Faulkner said.

Faulkner said The Network addresses the need for increased cybersecurity measures as defined in the president’s recent Executive Order for “Improving Critical Infrastructure Cybersecurity” because it screens each transaction for risks.”The key takeaway from Obama’s Executive Order is that a collective threat, such as the threat to our nation’s infrastructure, requires a collective and orchestrated response,” he said.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.