logo

Fingerprint launches features to fight fraud in agentic AI era

Finextra15-07-2025
Fingerprint, a leader in device intelligence for fraud prevention, account security, and returning user experience optimization, today announced new Smart Signals and platform enhancements that detect malicious bots and AI agents, distinguishing them from legitimate automated traffic.
0
This content is provided by an external author without editing by Finextra. It expresses the views and opinions of the author.
As agentic commerce experiences explosive growth and autonomous AI agents become increasingly sophisticated, enterprises need advanced tools to protect against evolving fraud schemes without delaying innovation or turning away legitimate transactions.
Bots currently comprise over half of all internet traffic, with 30% classified as malicious, and Gartner predicts fully autonomous AI agents by 2036. This creates a critical challenge for businesses to differentiate between beneficial automation and malicious activity. Fingerprint's new Smart Signals address this challenge by providing real-time risk indicators based on a device's behavior, environment and configuration to enable enterprises to make better-informed decisions.
"Bots and AI agents represent both the biggest current risk and the fastest-evolving threat landscape we've seen," said Dan Pinto, CEO and co-founderof Fingerprint. "As agentic AI technology advances rapidly and becomes more cost-effective, malicious actors are increasingly leveraging these tools for sophisticated fraud. Fingerprint's new Smart Signals ensures enterprises can harness the benefits of AI while maintaining robust defenses against malicious bots and agents that threaten essential business operations."
Fingerprint Smart Signals and Features for Enterprises: Bot/AI Agent Detection


• Bot Detection Smart Signal
• can detect dozens of bot detection and browser automation software tools. It performs intelligent
• classification on each API request to determine whether a bot or agent is legitimate or malicious, with only verified beneficial bots and agents classified as trustworthy.



• Virtual Machine Detection Smart Signal
• further enhances AI agent and
• bot
• detection by identifying virtual machines, which are commonly used in automated fraud schemes.
• This capability provides an additional layer of protection against sophisticated attack vectors.



• Residential Proxy Detection
• addresses one of the most challenging aspects of modern fraud detection.
• Residential
• proxies are increasingly accessible and affordable, making them attractive tools for fraudsters
• looking to mask their IP addresses. Because agentic traffic can be routed through ISPs to real residential IP addresses—giving malicious agents high authenticity—the ability to detect residential proxies with confidence levels is crucial for identifying all
• types of agentic-driven fraud.



• Request Filtering:
• Fingerprint has gathered a list of known user agents used by AI companies for web scraping and model training, as well as AI assistants that help with scheduling and other repetitive tasks. The Request Filtering functionality allows customers to filter out
• these legitimate AI agents and bots from fingerprinting, helping optimize billing costs without compromising detection capabilities for AI-driven fraud.

The Rise of Intelligent Automation Demands Smarter Security for Enterprises
As legitimate AI agents become more common for business operations—from AI assistants that handle scheduling and repetitive tasks to agentic commerce where agents research and purchase products on users' behalf—the ability to differentiate between beneficial and malicious automation has become a critical industry requirement. With these new enhancements from Fingerprint, organizations can gain comprehensive visibility into visitor intent, enabling proactive defense against evolving attack patterns.
The new Smart Signals and features are available immediately and are designed to integrate seamlessly with existing Fingerprint implementations.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Xbox 360 Hacking Just Got Ridiculously Easy : Unlock Your Xbox 360's Hidden Powers
Xbox 360 Hacking Just Got Ridiculously Easy : Unlock Your Xbox 360's Hidden Powers

Geeky Gadgets

time10 minutes ago

  • Geeky Gadgets

Xbox 360 Hacking Just Got Ridiculously Easy : Unlock Your Xbox 360's Hidden Powers

What if you could unlock the full potential of your Xbox 360 without cracking it open or risking permanent damage? For years, console modding was a hobby reserved for the tech-savvy and fearless, requiring soldering skills, specialized tools, and a willingness to void warranties. But now, thanks to the innovative 'bad update' exploit, modding your Xbox 360 has become as simple as plugging in a USB flash drive. No hardware modifications. No advanced expertise. Just a few easy steps, and suddenly, your console transforms into a customizable powerhouse. It's a fantastic option for casual gamers and modding veterans alike, breaking down barriers that once kept many from exploring the full potential of their systems. Spawn Wave explains how this software-based exploit redefines Xbox 360 modding, making it accessible to virtually anyone. From running homebrew applications to recovering delisted games and even turning your console into a retro gaming hub, the possibilities are staggering. But it's not without its quirks—like its non-persistent nature, requiring reinitialization after every reboot. Whether you're curious about game preservation, custom dashboards, or just want to breathe new life into an aging console, this guide will show you what's possible and why this exploit is sparking excitement across the gaming community. The question is: how far will you take your Xbox 360? Xbox 360 Modding Simplified How the 'Bad Update' Exploit Operates The 'bad update' exploit uses a straightforward software method to bypass the Xbox 360's security system. This process is designed to be user-friendly while maintaining effectiveness. The steps include: Formatting a USB flash drive directly through the Xbox 360 console to ensure compatibility. Transferring specific exploit files onto the formatted USB drive. Using trial versions of certain games, such as Rock Band Blitz or Tony Hawk's American Wasteland , to trigger the exploit. or , to trigger the exploit. Activating tools like XE Unshackle and the Aurora custom dashboard to enable further modifications. Once activated, the exploit allows unsigned code execution, effectively bypassing the console's built-in restrictions. This capability unlocks a range of features that were previously inaccessible, transforming the Xbox 360 into a highly customizable platform. Expanded Possibilities with the Exploit Using the 'bad update' exploit opens up a wealth of opportunities for Xbox 360 users. These include: Running homebrew applications and executing unsigned code for enhanced functionality. Installing custom dashboards like Aurora to create a personalized user interface. to create a personalized user interface. Ripping and storing Xbox 360 and original Xbox games directly onto the console, reducing reliance on physical discs. Using emulators to play retro games from older systems, expanding the console's gaming library. Accessing homebrew games and tools through the Aurora homebrew store . . Recovering delisted Xbox Live Arcade titles, preserving digital content that is no longer available. These features allow users to repurpose their Xbox 360 into a versatile entertainment hub, offering capabilities far beyond its original design. Whether you're interested in game preservation, retro gaming, or simply customizing your console, the exploit provides a practical and accessible solution. Xbox 360 Hack Explained Watch this video on YouTube. Unlock more potential in Xbox 360 by reading previous articles we have written. Limitations and Considerations While the 'bad update' exploit offers numerous advantages, it is important to be aware of its limitations. The most notable drawback is its non-persistent nature. This means the exploit must be reinitialized each time the console is rebooted. Depending on the setup, this process can take anywhere from 10 seconds to two minutes, and occasional freezes or failures may occur during initialization. Additionally, while the software-based approach is convenient, it is less stable and reliable compared to hardware modifications like the Reset Glitch Hack (RGH). Hardware mods provide a permanent solution but require technical expertise and physical alterations to the console. For users seeking a balance between simplicity and functionality, the 'bad update' exploit remains an appealing option despite these limitations. Practical Advantages for Users The 'bad update' exploit delivers several practical benefits that make it an attractive choice for Xbox 360 owners: It eliminates the need for hardware modifications, making console customization more accessible to a wider audience. It supports game preservation by allowing users to rip and store physical discs or recover delisted digital content. It enhances compatibility with older titles through improved original Xbox emulation, broadening the range of playable games. It provides a low-risk entry point for users interested in exploring homebrew applications and custom dashboards. These advantages highlight the exploit's potential to transform the Xbox 360 into a more versatile and user-friendly system, catering to both casual gamers and dedicated modding enthusiasts. The Future of the 'Bad Update' Exploit The Xbox 360 modding community continues to refine and improve the 'bad update' exploit. Efforts are underway to enhance its reliability and reduce initialization times, making it an increasingly viable alternative to hardware-based modifications. For casual users, the exploit represents a low-risk and straightforward way to explore console customization. With ongoing updates and strong community support, the exploit is poised to further expand the Xbox 360's capabilities, making sure its relevance well into the future. As the modding landscape evolves, this software-based approach may become the preferred method for unlocking the full potential of the Xbox 360. Media Credit: Spawn Wave Filed Under: Cool Mods, Gaming News, Hardware Latest Geeky Gadgets Deals Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.

Stablecoin issuer Circle's revenue jumps in first results since blockbuster IPO
Stablecoin issuer Circle's revenue jumps in first results since blockbuster IPO

Reuters

time12 minutes ago

  • Reuters

Stablecoin issuer Circle's revenue jumps in first results since blockbuster IPO

Aug 12 (Reuters) - Circle (CRCL.N), opens new tab posted higher revenue and reserve income on Tuesday in its maiden quarterly results since going public in June, driven by increased circulation of its USDC stablecoin and stronger subscription services. Shares rose 5% in premarket trading, solidifying the rally that has pushed the company's stock to more than five times its initial public offering price. Stablecoins, which are digital tokens backed by low-risk assets such as the U.S. dollar or Treasuries, have drawn increasing investor attention, especially since the Genius Act was passed last month. The law has led some analysts to speculate that the tokens could be used for cross-border remittances and as a bridge between traditional banking and digital finance. The momentum has helped companies such as Circle, which issues USDC, the second-biggest stablecoin by market value after Tether. USDC in circulation grew 90% as of June 30, compared to a year earlier, the company said. The company's revenue and reserve income grew 53% year-over-year to $658 million, thanks to a jump in the interest it earns from the cash and short-term investments backing its USDC stablecoins. Revenue from subscription and services also rose, Circle said. It reported a net loss of $482 million, primarily due to two non-cash charges related to its IPO, including costs for employee stock awards that vested when the company went public and a higher valuation of its convertible debt following a rise in its share price.

Why e dey important to off your phone for plane
Why e dey important to off your phone for plane

BBC News

time12 minutes ago

  • BBC News

Why e dey important to off your phone for plane

You carry yourself, pay plenti money enta aeroplane either bicos di road no safe or you need to go wia you dey go fairly sharparly. You siddon, dem do all di safety tok-tok, to wear belt and den di pilot tell you say time don reach to off your phone, but you dey play games or watch video, but not for di first time, you ask your sef why I dey run dis parole? Some theories dey point say phones and oda gadgets fit affect di electronic systems. According to regulations wey resemble demselves worldwide, electronic devices no suppose to stay on under 3,000m (10,000ft), even if e dey in flight mode. But above dat height from di ground pipo fit use laptops or music players but di phones go still dey off. Di US Federal Aviation Administration ban cell phones for airborne use howeva bicos say e fit interfere wit aircraft instruments. Dem say "devices fit dey used for airplane mode or wit cell connection off. You fit use WiFI connection on your device if di plane get WiFI system and airline allow di use." Di US constitution tok say "di use of cellular telephones while di aircraft dey airborne dey prohibited by FCC rules". BBC tori pesin, Katia Moskvitch tok say personal phones fit act to malfunction aeroplanes bicos of dia electronics based systems wey dem dey call avionics. Dis avionics na wetin det used for navigation, to tok wit pipo for ground and monitor wetin dey keep di plane for air and some of dis components dey use sensors to take give informate to di cockpit. So na how phones fit affect di information wey di plane dey get. No be just phone sha o, Kindles, laptops and handheld gaming consoles bicos all of dem dey comot radio waves. If dis waves dey at frequencies wey dey close to di ones di avionics dey emit, e fit corrupt di signals and readings wey dem dey provide. If dis sensors no work, e fit affect systems like radar, communications and collision avoidance technology. Di problem fit rise well well if your devices don spoil and dey comot stronger radio waves or if di signals from multiple device combine. No record do show say crashes don dey directly linked to phone use interference but sometimes pesin no dey know wetin dey cause di accidents. Flight recorder fit no show say critical system bin fail bicos of electromagnetic interference from passengers devices. However, even though straight line no dey between crash and use of electronic devices. Katie reveal say US Aviation Safety Reporting System wey Nasa dey maintain show 50 cases of safety issues wey phone use cause. One case report tok say, "First Officer report say compass systems bin get k-leg for initial climb. Wen dem ask passengers to make sure say all dia devices bin dey off, di compass system go back to normal." One 2006 analysis of di data base show 77 times wey dey highly link interference from electronic gadgets. Di International Air Transport Association (IATA) show 75 separate incidents wey pilots believe say na phones cause electronic interference between 2003 and 2009. BBC tori pesin, Katia Moskvitch point out say even though some airlines don dey advertise how dem go allow pipo to use dia phones for flights, no be for wen di plane dey take off or land, na just for wen di plane dey cruising altitude. Wetin you fit do or not do in plane BBC News Pidgin reach out to di Director, Public Affairs & Consumer Protection for di Nigeria Civil Aviation Authority (NCAA), Michael Achimugu on wetin be di aviation regulations wey dey guide airline passengers, and e list di offences wey include but no dey limited to di following; Smoking for inside plane or for non-smoking area of di terminal building na offence. Use of mobile phones and/or oda communication/electronics gadgets inside plane without di approval of di aircraft Commander na offence. Fighting or oda disorderly conduct for inside plane or for di terminal building na offence. Any conduct/act wey constitute nuisance to oda passengers na offence. Disobedience of lawful instructions issued by di aircraft commander, flight crew, cabin attendants, check-in staff and/or security screening staff na offence. Any conduct wey endanger or wey dey likely to endanger di safety of flight operations na crime. Tampering wit smoke detectors and oda aircraft equipment na crime. No pesin dey allowed to carry, or attempt to carry, weapons, prohibited items or oda dangerous devices for body, or for inside im load for plane unless e dey authorized for transport. No pesin go dey allowed to enta security restricted area or sterile area unless di aviation security officer don screen and clear am for entry. Na crime to take pictures or videos for restricted areas for di airport terminal Carry Prohibited Items: Items like sharp objects, flammable liquids, or certain electronics dey restricted and security go seize am. Di Nigeria Civil Aviation Authority regulations allow di aircraft commander or airport authority to take di necessary measures wey include restraint wia necessary wen dem see any passenger wey dey misbehave on board or for di terminal building. NCAA also list offences and di penalty for inside airplane or for terminal area. Operating a portable electronic device in violation of crew directives go attract - Maximum civil penalty Drinking alcoholic beverages wey no be di operator serve - Maximum civil penalty Interference wit crew member go attract - Maximum civil penalty Physical assault or threat to physically assault a flight or cabin crewmember go attract - Minimum to maximum civil penalty and/or criminal referral Physical assault or threat to physically assault an individual wey no be crewmember - Minimum to maximum civil penalty and/or criminal referral. Traveller wey act in a manner wey pose imminent threat to di safety of aircraft or oda individuals on di aircraft go face - Minimum to maximum civil penalty and/or criminal referral. Smoking for area wia dem write or put "No Smoking' sign - Maximum civil penalty. Smoking for aircraft lavatory - Maximum civil penalty. Tampering wit smoke detector - Minimum to maximum civil penalty and/or criminal referral. Refusal to fasten seat belt for wia seat belt sign dey - Minimum to moderate civil penalty.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store