Be a part of our every day and weekly newsletters for the newest updates and unique content material on industry-leading AI protection. Be taught Extra
Greater than 40% of company fraud is now AI-driven, designed to imitate actual customers, bypass conventional defenses and scale at speeds that overwhelm even the best-equipped SOCs.
In 2024, almost 90% of enterprises had been focused, and half of them misplaced $10 million or extra.
Bots emulate human conduct and create complete emulation frameworks, artificial identities, and behavioral spoofing to tug off account takeovers at scale whereas slipping previous legacy firewalls, EDR instruments, and siloed fraud detection methods.
Attackers weaponize AI to create bots that evade, mimic, and scale
Attackers aren’t losing any time capitalizing on utilizing AI to weaponize bots in new methods. Final yr, malicious bots comprised 24% of all web site visitors, with 49% labeled as ‘superior bots’ designed to imitate human conduct and execute complicated interactions, together with account takeovers (ATO).
Over 60% of account takeover (ATO) makes an attempt in 2024 had been initiated by bots, able to breaching a sufferer’s credentials in actual time utilizing emulation frameworks that mimic human conduct. Attacker’s tradecraft now displays the flexibility to mix weaponized AI and behavioral assault methods right into a single bot technique.
That’s proving to be a deadly mixture for a lot of enterprises already battling malicious bots whose intrusion makes an attempt usually aren’t captured by present apps and instruments in safety operations facilities (SOCs).
Malicious bot assaults pressure SOC groups into firefighting mode with little or no warning, relying on the legacy of their safety tech stack.
“As soon as amassed by a menace actor, they are often weaponized,” Ken Dunham, director of the menace analysis unit at Qualys just lately mentioned. “Bots have unimaginable sources and capabilities to carry out nameless, distributed, asynchronous assaults towards targets of alternative, resembling brute pressure credential assaults, distributed denial of service assaults, vulnerability scans, tried exploitation and extra.”
From fan frenzy to fraud floor: bots nook the marketplace for Taylor Swift tickets
Bots are the digital model of attackers who can scale to tens of millions of makes an attempt per second to assault a focused enterprise and more and more high-profile occasions, together with concert events of well-known entertainers, resembling Taylor Swift.
DataDome observes that the worldwide recognition of Taylor Swift’s concert events creates the ROI attackers are on the lookout for to construct ticket bots that automate what scalpers do at scale. Ticket bots, as DataDome calls them, scoop up huge portions of tickets on the world’s hottest occasions after which resell them at vital markups.
The bots flooded Ticketmaster and had been a big a part of a surge of 3.5 billion requests that hit the ticket web site, inflicting it to crash repeatedly. Hundreds of followers had been unable to entry the presale group, and finally, the final ticket sale needed to be canceled.
Swarms of weaponized bots froze tens of hundreds of Swifties from attending her final Eras live performance tour. VentureBeat has realized of comparable assaults on the world’s main manufacturers on their on-line shops and presence globally. Coping with bot assaults at that scale, powered by weaponized AI, is past the scope of an e-commerce tech stack to deal with – they’re not constructed to take care of that degree of safety menace.
“It’s not nearly blocking bots—it’s about restoring equity,” Benjamin Fabre, CEO of DataDome, informed VentureBeat in a current interview. The corporate helped deflect comparable scalping assaults in milliseconds, distinguishing followers from fraud utilizing multi-modal AI and real-time session evaluation.
Bot assaults weaponized with AI usually begin by concentrating on login and session flows, bypassing endpoints in an try to not be detected by commonplace net software firewalls (WAF) and endpoint detection and response (EDR) instruments. Such refined assaults have to be tracked and contained in a enterprise’s core safety infrastructure, managed from its SOC.
Why SOC groups at the moment are on the entrance line
Weaponized bots at the moment are a key a part of any attacker’s arsenal, able to scaling past what fraud groups alone can comprise throughout an assault. Bots have confirmed deadly, taking down enterprises’ e-commerce operations or, within the case of Ticketmaster, a best-selling live performance tour value billions in income.
In consequence, extra enterprises are bolstering the tech stacks supporting their SOCs with on-line fraud detection (OFD) platforms. Gartner’s Dan Ayoub just lately wrote within the agency’s analysis be aware Rising Tech Affect Radar: On-line Fraud Detection that “organizations are more and more waking as much as the understanding that ‘fraud is a safety drawback’ as is turning into evident in adoption of among the rising applied sciences being leveraged immediately”.
Gartner’s analysis and VentureBeat’s interviews with CISOs affirm that immediately’s malicious bot assaults are too quick, stealthy and able to reconfiguring themselves on the fly for siloed fraud instruments to deal with. Weaponized bots have lengthy been capable of exploit gaps between WAFs, EDR instruments and fraud scoring engines, whereas additionally evading static guidelines which might be so prevalent in legacy fraud detection methods.
All these elements and extra are why CISOs are bringing fraud telemetry into the SOC.
Journey-Time Orchestration is the following wave of on-line fraud detection (OFD)
AI-enabled bots are always studying the way to bypass long-standing fraud detection platforms that depend on sporadic or single point-in-time checks. These checks embody login validations, transaction scoring monitoring over time, and a collection of challenge-responses. Whereas these had been efficient earlier than the widespread weaponization of bots, botnets and networks, AI-literate adversaries now know the way to exploit context switching and, as many deepfakes assaults have confirmed, know the way to excel at behavioral mimicry.
Gartner’s analysis factors to Journey Time Orchestration (JTO) because the defining structure for the following wave of OFD platforms that may assist SOCs higher comprise the onslaught of AI-driven bot assaults. Core to JTO is embedding fraud defenses all through every digital session being monitored and scoring threat repeatedly from login to checkout to post-transaction conduct.

Journey-Time Orchestration repeatedly scores threat throughout the complete person session—from login to post-transaction—to detect AI-driven bots. It replaces single-point fraud checks with real-time, session-wide monitoring to counter behavioral mimicry and context-switching assaults. Supply: Gartner, Innovation Perception: IAM Journey-Time Orchestration, Feb. 2025
Who’s establishing an early lead in Journey Time Orchestration protection
DataDome, Ivanti and Telesign are three corporations whose approaches present the ability of shifting safety from static checkpoints to steady, real-time assessments is paying off. Every additionally reveals why the way forward for SOCs have to be predicated on real-time information to succeed. All three of those corporations’ platforms have progressed to delivering scoring for each person interplay all the way down to the API name, delivering higher contextual perception throughout each conduct on each system, inside every session.
What units these three corporations aside is how they’ve taken on the challenges of hardening fraud prevention, automating core safety capabilities whereas frequently bettering person experiences. Every combines these strengths on real-time platforms which might be additionally AI-driven and frequently study – two core necessities to maintain up with weaponized AI arsenals that embody botnets.
DataDome: Pondering Like an Attacker in Actual Time
DataDome, A class chief in real-time bot protection, has intensive experience in AI-intensive behavioral modeling and depends on a platform that features over 85,000 machine studying fashions delivered concurrently throughout 30+ international PoPs. Their international attain permits them to examine greater than 5 trillion information factors every day. Each net, cell and API request that their platform can establish is scored in actual time (usually inside 2 milliseconds) utilizing multi-modal AI that correlates system fingerprinting, IP entropy, browser header consistency and conduct biometrics.
“Our philosophy is to assume like an attacker,” Fabre informed VentureBeat. “Meaning analyzing each request anew—with out assuming belief—and repeatedly retraining our detection fashions to adapt to zero-day techniques”.
In contrast to legacy methods, which lean on static heuristics or CAPTCHAs, DataDome’s method minimizes friction for verified, reputable customers. Its false-positive fee is below 0.01%, which means fewer than 1 in 10,000 human guests see a problem display. Even when challenged, the platform invisibly continues conduct evaluation to confirm the person’s legitimacy.
“Bots aren’t simply fixing CAPTCHAs now—they’re fixing them sooner than people,” Fabre added. “That’s why we moved away from static challenges fully. AI is the one solution to beat AI-driven fraud at scale”.
Living proof: DataDome has confirmed able to distinguishing between bots and followers in milliseconds, stopping bulk buyouts and preserving ticket fairness throughout peak masses – all in real-time. In luxurious retail, manufacturers like Hermès deploy DataDome to guard high-demand drops (e.g., Birkin baggage) from automated hoarding.
Ivanti Extends Zero Belief and publicity administration into the SOC
Ivanti is redefining publicity administration by integrating real-time fraud alerts instantly into SOC workflows by means of its Ivanti Neurons for Zero Belief Entry and Ivanti Neurons for Patch Administration platforms. “Zero belief doesn’t cease at logins,” Mike Riemer, Ivanti Discipline CISO informed VentureBeat throughout a current interview. “We’ve prolonged it to session behaviors together with credential resets, cost submissions, and profile edits are all potential exploit paths.”
Ivanti Neurons repeatedly evaluates system posture and identification conduct, flagging anomalous exercise and implementing least-privilege entry mid-session. “2025 will mark a turning level,” added Daren Goeson, SVP of product administration at Ivanti. “Now defenders can use GenAI to correlate conduct throughout periods and predict threats sooner than any human staff ever might.”
As assault surfaces develop, Ivanti’s platform helps SOC groups detect SIM swaps, mitigate lateral motion and automate dynamic microsegmentation. “What we at the moment name ‘patch administration’ ought to extra aptly be named publicity administration or how lengthy is your group keen to be uncovered to a selected vulnerability?” Chris Goettl, VP of product administration for endpoint safety at Ivanti informed VentureBeat. “Danger-based algorithms assist groups establish high-risk threats amid the noise of quite a few updates.”
“Organizations ought to transition from reactive vulnerability administration to a proactive publicity administration method,” added Goeson. “By adopting a steady method, they’ll successfully defend their digital infrastructure from trendy cyber dangers.”
Telesign’s AI-driven identification intelligence pushes fraud detection to session scale
Telesign is redefining digital belief by bringing identification intelligence at session scale to the entrance strains of fraud detection. By analyzing greater than 2,200 digital identification alerts starting from telephone quantity metadata to system hygiene and IP fame, Telesign’s APIs ship real-time threat scores that catch bots and artificial identities earlier than injury is finished.
“AI is the perfect protection towards AI-enabled fraud assaults,” mentioned Telesign CEO Christophe Van de Weyer in a current interview with VentureBeat. “At Telesign, we’re dedicated to leveraging AI and ML applied sciences to fight digital fraud, guaranteeing a safer and reliable digital surroundings for all.”
Fairly than counting on static checkpoints at login or checkout, Telesign’s dynamic threat scoring repeatedly evaluates conduct all through the session. “Machine studying has the ability to always learn the way fraudsters behave,” Van de Weyer informed VentureBeat. “It may possibly examine typical person behaviors to create baselines and construct threat fashions.”
Telesign’s Confirm API underscores its omnichannel technique, enabling identification verification throughout SMS, electronic mail, WhatsApp, and extra, all by means of a single API. “Verifying prospects is so essential as a result of many sorts of fraud can usually be stopped on the ‘entrance door,’” Van de Weyer famous in a current VentureBeat interview.
As generative AI accelerates attacker sophistication, Van de Weyer issued a transparent name to motion: “The emergence of AI has introduced the significance of belief within the digital world to the forefront. Companies that prioritize belief will emerge as leaders within the digital financial system.” With AI as its spine, Telesign seems to show belief right into a aggressive benefit.
Why fraud prevention’s future belongs within the SOC
For fraud safety to scale, it have to be built-in into the broader safety infrastructure stack and owned by the SOC groups who use it to avert potential assaults. On-line fraud detection platforms and apps are proving simply as vital as APIs, Id and Entry Administration (IAM), EDRs, SIEMs and XDRs. VentureBeat is seeing extra safety groups in SOCs take higher possession of validating how shopper transactions are modeled, scored and challenged.