<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IA Archives - Oneytrust</title>
	<atom:link href="https://www.oneytrust.com/it/tag/ia/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.oneytrust.com/it/tag/ia/</link>
	<description>Only Trusted Customers. Oneytrust provides fraud detection and identity validation for merchants and banks. Unique consortia data, unbeatable fraud scoring.</description>
	<lastbuilddate>Fri, 20 Mar 2026 10:49:57 +0000</lastbuilddate>
	<language>it-IT</language>
	<sy:updateperiod>
	hourly	</sy:updateperiod>
	<sy:updatefrequency>
	1	</sy:updatefrequency>
	

<image>
	<url>https://www.oneytrust.com/wp-content/uploads/2025/06/cropped-Oneytrust_Symbol_Purple_Square-32x32.png</url>
	<title>IA Archives - Oneytrust</title>
	<link>https://www.oneytrust.com/it/tag/ia/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Refund fraud: when AI becomes a tool for fraudsters…</title>
		<link>https://www.oneytrust.com/it/fraude-remboursement-ia-generative/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Fri, 20 Mar 2026 10:49:55 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[AI ACT]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[Fraud prevention]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=3802</guid>

					<description><![CDATA[<p>A phenomenon that TF1 recently highlighted in its 8pm news report, in which Oneytrust was able to share its expertise and shed light on these new fraudulent practices. 🚨 Fraud is evolving rapidly thanks to generative AI Fraudsters now have access to technologies that were once the preserve of experts. It takes just a few...</p>
<p>The post <a href="https://www.oneytrust.com/it/fraude-remboursement-ia-generative/">Refund fraud: when AI becomes a tool for fraudsters…</a> appeared first on <a href="https://www.oneytrust.com/it">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A phenomenon that TF1 recently highlighted in its 8pm news report, in which Oneytrust was able to share its expertise and shed light on these new fraudulent practices.</p>



<figure class="wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="TF1-oneytrust mars2026" src="https://player.vimeo.com/video/1172835019?dnt=1&amp;app_id=122963" width="720" height="405" frameborder="0" allow="autoplay; fullscreen; picture-in-picture; clipboard-write; encrypted-media; web-share" referrerpolicy="strict-origin-when-cross-origin"></iframe>
</div></figure>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f6a8.png" alt="🚨" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Fraud is evolving rapidly thanks to generative AI</strong></p>



<p>Fraudsters now have access to technologies that were once the preserve of experts. It takes just a few clicks to generate:</p>



<ul class="wp-block-list">
<li><strong>doctored images</strong> of products “supposedly” broken,</li>



<li><strong>forged supporting documents</strong>,</li>



<li>and well-crafted <strong>synthetic identities</strong></li>
</ul>



<p>As TF1 explains, private sellers are now facing disputes based on AI-manipulated photos, with automated systems sometimes turning against the honest victim themselves.</p>



<p>One user interviewed recounted losing €180 due to an AI-generated image showing a supposedly broken vinyl record — an item that, by its very nature, does not break in that way. The platform’s automated system, however, ruled in favour of the fraudster, illustrating the vulnerability of traditional checks.</p>



<p>This phenomenon is part of a global trend: fraud involving doctored images is skyrocketing, with a 15% increase in falsified images in claims since the start of 2025.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f4c8.png" alt="📈" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Three major trends observed by Oneytrust</strong></p>



<p>At Oneytrust, our experts have identified three major shifts:</p>



<ol class="wp-block-list">
<li><strong>More sophisticated fraud</strong></li>
</ol>



<p>Generative AI can produce highly realistic images, some of which are impossible to distinguish with the naked eye. Synthetic identities or invoices recreated pixel by pixel can fool traditional verification systems.</p>



<ol start="2" class="wp-block-list">
<li><strong>The industrialisation of attempts</strong></li>
</ol>



<p>What was once manual work is now automated. Fraudsters are now launching vast, coordinated campaigns, drastically increasing the volume of attempts detected on e-commerce sites.<br>This industrialisation is confirmed by the TF1 report, which warns of waves of scams potentially affecting millions of people.</p>



<ol start="3" class="wp-block-list">
<li><strong>New weak signals</strong></li>
</ol>



<p>Traditional methods are no longer sufficient. When evidence is generated by AI, behaviour, metadata and contextual inconsistencies become the new areas of analysis.</p>



<p><br><strong><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f6e1.png" alt="🛡" class="wp-smiley" style="height: 1em; max-height: 1em;" /> AI: an essential tool for countering these new attacks</strong></p>



<p>With fraudsters now using AI, anti-fraud solutions must evolve. That is why Oneytrust has integrated advanced artificial intelligence models at the heart of its technologies.</p>



<p>In particular, our systems enable us to:</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Detect behavioural and contextual inconsistencies</strong></p>



<p>Frequency of returns, unusual histories, multiple addresses or devices: the patterns speak for themselves.<br>Our solution cross-references these signals to identify abuse well before it becomes visibly repetitive.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /><strong> Adapt in real time</strong></p>



<p>Fraud methods change every week. Our models continuously recalibrate to keep pace with these changes and block emerging attacks.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Identify organised networks</strong></p>



<p>By analysing data structure and correlating identity details, devices and network history, Oneytrust exposes organised criminal groups operating under different identities or accounts.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Tailor detection to your returns processes</strong></p>



<p>Oneytrust adapts precisely to each retailer’s returns policies and internal workflows, incorporating their rules, thresholds and operational specifics.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f91d.png" alt="🤝" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>The real challenge: maintaining trust</strong></p>



<p>In this context, the issue is no longer simply about blocking fraud.<br>It is about <strong>protecting the relationship of trust </strong>between retailers and their customers.</p>



<p>Excessive suspicion can damage the shopping experience. Being too permissive can encourage abuse and undermine business models. The balance is therefore delicate — and AI plays a crucial role in accurately distinguishing between:</p>



<ul class="wp-block-list">
<li>honest shoppers,</li>



<li>opportunistic fraudsters,</li>



<li>and organised criminal networks.</li>
</ul>



<p>Oneytrust is committed to maintaining this balance by combining cutting-edge technology with human expertise.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f52e.png" alt="🔮" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Fraud and AI: a huge challenge… but far from insurmountable</strong></p>



<p>Artificial intelligence has profoundly transformed the landscape of reimbursement fraud. Whilst it provides fraudsters with new tools, it further enhances companies’ ability to detect and stop them.</p>



<p>With ongoing investment, increasingly sophisticated models and greater collaboration across the entire ecosystem, this battle is not only possible, but winnable.</p>



<p>Trust is one of the cornerstones of online commerce. Together, let’s continue to protect it.</p><p>The post <a href="https://www.oneytrust.com/it/fraude-remboursement-ia-generative/">Refund fraud: when AI becomes a tool for fraudsters…</a> appeared first on <a href="https://www.oneytrust.com/it">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI Act and Fraud Prevention : why the market must prepare</title>
		<link>https://www.oneytrust.com/it/ai-act-2026-lutte-contre-la-fraude/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Fri, 27 Feb 2026 18:21:43 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[AI ACT]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[Fraud prevention]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=3747</guid>

					<description><![CDATA[<p>Find out how Oneytrust is preparing to comply with this new text, which is just as crucial as the GDPR was in its day! The text defines an AI system very broadly as a ‘machine-based system, operating with varying degrees of autonomy, capable of adapting after deployment and which, for explicit or implicit purposes, deduces...</p>
<p>The post <a href="https://www.oneytrust.com/it/ai-act-2026-lutte-contre-la-fraude/">AI Act and Fraud Prevention : why the market must prepare</a> appeared first on <a href="https://www.oneytrust.com/it">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><br>Find out how Oneytrust is preparing to comply with this new text, which is just as crucial as the GDPR was in its day!</p>



<ol class="wp-block-list">
<li><strong>The new broad definition of an ‘AI system’</strong></li>
</ol>



<p>The text defines an AI system very broadly as a ‘machine-based system, operating with varying degrees of autonomy, capable of adapting after deployment and which, for explicit or implicit purposes, deduces from data how to generate results (predictions, content, recommendations, decisions) that influence physical or virtual environments’.</p>



<p>This broad technological scope is complex to implement operationally, but the market agrees that it encompasses sophisticated approaches such as machine learning (ML), hybrid expert rule + machine learning approaches, and advanced optimisation.</p>



<p>With the proliferation of AI use by fraudsters, trusted anti-fraud companies such as Oneytrust will need to further develop their range of AI solutions to power their scoring, behavioural alerting and anomaly analysis engines in order to keep up with the times and identify increasingly sophisticated fraud patterns.</p>



<ol start="2" class="wp-block-list">
<li><strong>Risks: where does fraud detection fit in?</strong></li>
</ol>



<p>The AI Act classifies certain uses as ‘high risk’ (critical biometrics, employment, education, access to essential services such as credit scoring, health insurance pricing, etc.). These systems are authorised but must be accompanied by a very sophisticated risk management system and an assessment of their compliance before being placed on the market.</p>



<p>One notable exception is that AI used to detect financial fraud is not automatically considered ‘high risk’. This reduces the direct regulatory burden, but does not remove the expectations of transparency, data quality and human oversight that regulated institutions contractually pass on to their subsidiaries and suppliers (such as Oneytrust).</p>



<ol start="3" class="wp-block-list">
<li><strong>What are the key dates to remember?</strong></li>
</ol>



<p>The main requirements of the AI Act will come into force in stages. Here are the key dates to remember:</p>



<ul class="wp-block-list">
<li><strong>2 February 2025</strong>: entry into force of the ‘unacceptable risk’ prohibitions + AI literacy requirement (awareness/training for staff involved in AI).</li>



<li><strong>2 August 2025</strong>: obligations for general-purpose AI models (GPAI) begin to apply (generative AI).</li>



<li><strong>2 February 2026</strong>: European deadline for certain implementing acts (post-market surveillance plans).</li>



<li><strong>2 August 2026</strong>: obligations for high-risk AI systems.</li>



<li><strong>August 2027</strong>: general application of all provisions of the regulation.</li>
</ul>



<ol start="4" class="wp-block-list">
<li><strong>Why prepare even if you are not ‘high risk’?</strong></li>
</ol>



<p>Fraudsters are becoming industrialised with AI. Deepfakes, fake documents, automated attack scripts, automated use of synthetic identities: fraud is scaling up. Those involved in the fight against fraud must adapt quickly to these new trends.</p>



<p>Although fraud prevention is not explicitly considered high risk, it is essential to ensure that solutions respect the fundamental rights and privacy of customers and end users, whether in accordance with the GDPR or the AI Act. In addition, the expectations of regulated partners (mainly in the banking sector) are increasingly high, as they are subject to sector-specific requirements that demand traceability, good documentation and heightened vigilance regarding the quality of the data used to satisfy their supervisors.</p>



<ol start="5" class="wp-block-list">
<li><strong>The Oneytrust response</strong></li>
</ol>



<p>Oneytrust provides identity verification and fraud detection solutions for e-merchants, fintechs and banks, relying on AI solutions coupled with our 25 years of human expertise in fraud prevention to detect synthetic identities, transactional anomalies and risk signals in real time. We are members of the BPCE Group, which drives us to high standards of compliance and model governance.<sup data-fn="5de12d73-b305-46c7-8f46-0517b019a95f" class="fn"><a id="5de12d73-b305-46c7-8f46-0517b019a95f-link" href="#5de12d73-b305-46c7-8f46-0517b019a95f">1</a></sup></p>



<p>As with the GDPR, we did not wait to cultivate our expertise on the AI Act and have been raising awareness and training our staff on these new compliance issues for several years. <strong>Contact us if you would like to learn more about Oneytrust&#8217;s vision for AI compliance and risk management!</strong></p><p>The post <a href="https://www.oneytrust.com/it/ai-act-2026-lutte-contre-la-fraude/">AI Act and Fraud Prevention : why the market must prepare</a> appeared first on <a href="https://www.oneytrust.com/it">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Digital identity: the new identity card for the digital age &#8211; Part 2</title>
		<link>https://www.oneytrust.com/it/digital-identity-the-new-identity-card-for-the-digital-age-part-2/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Wed, 01 Oct 2025 15:13:36 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ADN]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=2529</guid>

					<description><![CDATA[<p>a) Security and protection of citizens The primary purpose of digital identity is protection. Users whose identities are stolen suffer dramatic consequences: loans taken out in their name, administrative disputes, damaged online reputations. Having a robust digital identity based on reliable technical and behavioural signals helps limit these risks. b) Trust and fluidity of exchanges...</p>
<p>The post <a href="https://www.oneytrust.com/it/digital-identity-the-new-identity-card-for-the-digital-age-part-2/">Digital identity: the new identity card for the digital age &#8211; Part 2</a> appeared first on <a href="https://www.oneytrust.com/it">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<ol class="wp-block-list">
<li><strong>Multiple challenges</strong></li>
</ol>



<p><strong>a) Security and protection of citizens</strong></p>



<p><strong>The primary purpose of digital identity is protection</strong>. Users whose identities are stolen suffer dramatic consequences: loans taken out in their name, administrative disputes, damaged online reputations. Having a robust digital identity based on reliable technical and behavioural signals helps limit these risks.</p>



<p><strong>b) Trust and fluidity of exchanges</strong></p>



<p>For a company, <strong>accepting a new customer involves a risk</strong>. Digital identity provides the necessary elements to establish a trust score: is this a real, consistent person who has been active for a long time? This trust then facilitates exchanges, reduces friction (simplified KYC, smooth user journey) and improves the customer experience.</p>



<p><strong>c) Sovereignty and independence</strong></p>



<p>Today, proving one&#8217;s identity online often involves major private players (connection via Google, Apple or Facebook). However, <strong>delegating this strategic function to a few companies poses a problem of sovereignty</strong>. European states are seeking to regain control in order to avoid excessive dependence and guarantee data protection.</p>



<p><strong>d) Inclusion and equal access</strong></p>



<p><strong>Digital identity must not become a factor of exclusion</strong>. People who are digitally excluded (the elderly, rural areas, vulnerable populations) must have access to simple and accessible solutions. Equity requires an inclusive design of these tools.</p>



<ol start="2" class="wp-block-list">
<li><strong>Future prospects</strong></li>
</ol>



<p>By 2030, digital identity could undergo three major developments:</p>



<p><strong>Increased standardisation</strong>: adoption of international standards enabling seamless recognition between countries and services.</p>



<p><strong>Biometric integration</strong>: enhanced association with biometric fingerprints (voice, face, fingerprint) to further secure access.</p>



<p><strong>Enhanced user control</strong>: emergence of solutions where users decide which elements of their identity to share, depending on the context (e.g. proving they are of legal age without revealing their date of birth).</p>



<p><strong>In a nutshell…</strong></p>



<p>Digital identity is no longer a technical curiosity. It has become the beating heart of digital societies. It protects, streamlines and empowers, but also raises questions about surveillance and sovereignty.</p>



<p>By understanding it, decision-makers and citizens have an essential lever for navigating a world where the virtual and the real are inseparable. Ultimately, <strong>digital identity is the identity card of the digital age: intangible but decisive, invisible but unavoidable</strong>.</p>



<p></p><p>The post <a href="https://www.oneytrust.com/it/digital-identity-the-new-identity-card-for-the-digital-age-part-2/">Digital identity: the new identity card for the digital age &#8211; Part 2</a> appeared first on <a href="https://www.oneytrust.com/it">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Digital identity: the new identity card for the digital age &#8211; Part 1</title>
		<link>https://www.oneytrust.com/it/digital-identity-the-new-identity-card-for-the-digital-age/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Wed, 24 Sep 2025 12:38:47 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ADN]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=2518</guid>

					<description><![CDATA[<p>Digital identity is therefore becoming the backbone of the connected world. It condenses our personal data, our ‘technical’ fingerprints (device fingerprinting), our behaviours and our interactions. It is at once a recognition tool, a shield against fraud and a key to accessing services. 1 . Defining digital identity: Unlike civil identity, which is established and...</p>
<p>The post <a href="https://www.oneytrust.com/it/digital-identity-the-new-identity-card-for-the-digital-age/">Digital identity: the new identity card for the digital age &#8211; Part 1</a> appeared first on <a href="https://www.oneytrust.com/it">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Digital identity is therefore becoming the backbone of the connected world. It condenses our personal data, our ‘technical’ fingerprints (device fingerprinting), our behaviours and our interactions. It is at once a recognition tool, a shield against fraud and a key to accessing services.</p>



<p><strong>1 . Defining digital identity</strong>:</p>



<p>Unlike civil identity, which is established and certified by the state, digital identity takes many forms. It is based on four main dimensions:</p>



<ul class="wp-block-list">
<li><strong>Declarative data</strong>: surname, first name, email address, telephone number, address. This information is provided voluntarily, but can be misused/“imitated”.</li>



<li><strong>Technical fingerprints</strong>: each connected device generates a unique signature (IP address, configuration, sensors, time zones, cookies). These signals, invisible to the naked eye, become valuable clues for recognising a user.</li>



<li><strong>Behaviour</strong>: typing speed, connection times, location, frequency of service use. These elements are more difficult to falsify and constitute a behavioural signature that is almost biometric.</li>



<li><strong>Social and economic interactions</strong>: history of contact, payment and browsing data use. This data builds a coherent narrative… or, conversely, reveals inconsistencies typical of fraudulent events.</li>
</ul>



<ol start="2" class="wp-block-list">
<li><strong>An identity in flux</strong></li>
</ol>



<p>Unlike a national identity card, which is fixed at the time of issue, digital identity is dynamic. Every connection, every payment, every interaction enriches this digital portrait. This dynamic provides robustness – it is difficult to simulate a consistent digital life over time – but also raises ethical questions:</p>



<p>How much data should be collected without infringing on privacy?</p>



<p>How can we ensure that users retain control over their digital identity?</p>



<p>What safeguards should be put in place to prevent widespread surveillance?</p>



<p>The GDPR in Europe and the concept of ‘self-sovereign identity’ attempt to provide answers. But the balance between security, fluidity and respect for individual freedoms remains fragile.</p>



<ol start="3" class="wp-block-list">
<li><strong>Why has this concept become so important?</strong></li>
</ol>



<p>Two major trends explain its growing importance. .</p>



<ul class="wp-block-list">
<li><strong>Widespread digitalisation</strong>: smartphones have become our universal access point. From public services to healthcare, everything is now digital. Initiatives such as France Identité and the European eIDAS 2.0 regulation aim to create digital identities that are recognised at national and supranational level.</li>



<li><strong>A boom in 100% web-based crime</strong>: identity fraud is skyrocketing. The concept of ‘synthetic identity’ illustrates this trend. Fraudsters assemble pieces of real and invented data to create fake profiles capable of fooling traditional controls.</li>
</ul>



<p>In this context, the ability to assess the credibility of a digital identity is becoming strategic for banks, insurers, retailers and also for governments.</p>



<p><strong>In a nutshell…</strong></p>



<p>Digital identity is constantly evolving: shaped by our usage, regulated by legislation, scrutinised for its security and commercial value. But this dynamic is not without its challenges. In the second part, we will address the multiple issues it raises – security, trust, sovereignty, inclusion – and the prospects that could redefine our relationship with identity by 2030.</p>



<p></p><p>The post <a href="https://www.oneytrust.com/it/digital-identity-the-new-identity-card-for-the-digital-age/">Digital identity: the new identity card for the digital age &#8211; Part 1</a> appeared first on <a href="https://www.oneytrust.com/it">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MERLIN network: anatomy of a triangular fraud</title>
		<link>https://www.oneytrust.com/it/merlin-network-anatomy-of-a-triangular-fraud-2/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Thu, 18 Sep 2025 16:06:27 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ADN]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=2454</guid>

					<description><![CDATA[<p>What is triangular fraud? Triangular fraud is a complex and ingenious method of fraud that combines elements of real and synthetic identities to create a network of fraudulent transactions. This type of fraud relies on the interaction between three parties: the fraudster, the legitimate seller and the unwitting consumer, in order to divert resources discreetly...</p>
<p>The post <a href="https://www.oneytrust.com/it/merlin-network-anatomy-of-a-triangular-fraud-2/">MERLIN network: anatomy of a triangular fraud</a> appeared first on <a href="https://www.oneytrust.com/it">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 class="wp-block-heading">What is triangular fraud?</h3>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="427" height="426" data-id="1702" src="https://www.oneytrust.com/wp-content/uploads/2025/09/MERLIN.jpg" alt="" class="wp-image-1702" srcset="https://www.oneytrust.com/wp-content/uploads/2025/09/MERLIN.jpg 427w, https://www.oneytrust.com/wp-content/uploads/2025/09/MERLIN-400x399.jpg 400w, https://www.oneytrust.com/wp-content/uploads/2025/09/MERLIN-12x12.jpg 12w" sizes="(max-width: 427px) 100vw, 427px" /></figure>
</figure>



<p>Triangular fraud is a complex and ingenious method of fraud that combines elements of real and synthetic identities to create a network of fraudulent transactions. This type of fraud relies on the interaction between three parties: the fraudster, the legitimate seller and the unwitting consumer, in order to divert resources discreetly and effectively.</p>



<p><strong>How triangular fraud works:</strong></p>



<p>The triangular fraud process can generally be broken down into four steps:</p>



<ol class="wp-block-list">
<li><strong>Creation of multiple identities</strong>: fraudsters begin by creating synthetic identities by combining real and fictitious information from real customer information received during purchases on their website. This allows them to generate credible buyer profiles that can interact with sellers without arousing suspicion.</li>



<li><strong>Ordering products</strong>: using these identities, fraudsters place orders with legitimate sellers. Payment is often made with stolen or misused credit cards.</li>



<li><strong>Reshipping products</strong>: the purchased products are shipped to intermediate addresses or directly to the ‘real customer’ depending on the method used. At this stage, fraudsters may also sell the stolen products to real buyers via online platforms at a reduced price.</li>



<li><strong>Cash-out</strong>: Fraudsters cash out payments from genuine buyers, while the original seller remains unpaid or faces a chargeback.</li>
</ol>



<p><strong>Why is triangular fraud effective?</strong></p>



<p>Triangular fraud is particularly effective because of its networked approach, which allows fraudsters to separate the elements of the transaction. The initial seller believes they are interacting with a legitimate buyer, while the final buyer thinks they are getting a product at a bargain price. This separation makes detection difficult, as individual transactions may appear legitimate because the information used is real, long-standing and sometimes even shows healthy activity. Traditional security rules are unable to detect these weak signals of fraud.</p>



<p><strong>The MERLIN network</strong></p>



<p>At Oneytrust, we are constantly detecting new fraudulent schemes. One of the most telling recent cases is that of a network we have named ‘Merlin’ because it used products from this brand to carry out its attacks. Detected in June 2024, this network perfectly illustrates the complexity and evolution of today&#8217;s threats.</p>



<p>It all started with <strong>an alert about unusual purchases</strong>: a sharp increase in orders for Merlin educational games, worth less than £100, from a partner specialising in childcare products. This sudden spike immediately caught our attention.</p>



<p>Our experts quickly spotted <strong>similarities between the orders</strong>, suggesting the existence of an organised network. However, certain elements were puzzling: the digital identities appeared reliable, and some profiles even belonged to real customers – but with a different email address. This was a clear sign of <strong>identity theft</strong>, which is rare for such small amounts.</p>



<p>To remove any doubt, we contacted the customers concerned. All confirmed their identity… but denied having made these purchases. The fraud was now certain. A thorough discussion with one of them revealed the key: he had indeed purchased the product, but on an online marketplace, not from our partner. The evidence provided enabled us to identify the fraudulent shop and understand the modus operandi: <strong>a triangular fraud</strong>.</p>



<p>Once the pattern had been established, our analysts listed <strong>the common signals associated with suspicious orders</strong> and created specific security rules. Thanks to these targeted actions, reinforced by direct checks with customers, we were able to block transactions linked to this network. <strong>The result: in less than 12 hours, the ‘Merlin’ network was neutralised.</strong></p>



<p>This case shows how essential <strong>the responsiveness and expertise of our teams are in stopping new fraud networks as soon as they emerge</strong>. And the story of ‘Merlin’ is only just beginning… we will tell you more very soon.</p><p>The post <a href="https://www.oneytrust.com/it/merlin-network-anatomy-of-a-triangular-fraud-2/">MERLIN network: anatomy of a triangular fraud</a> appeared first on <a href="https://www.oneytrust.com/it">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI at Oneytrust: technology at the heart of our DNA!</title>
		<link>https://www.oneytrust.com/it/ai-at-oneytrust-technology-at-the-heart-of-our-dna/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Fri, 22 Aug 2025 07:02:41 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ADN]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[sécurité]]></category>
		<category><![CDATA[technologie]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=1692</guid>

					<description><![CDATA[<p>1) Why AI has become essential in the fight against fraud The boom in language models and content generation tools has lowered the barriers to fraud: flawless phishing emails, carefully crafted fake profiles, synthetic identities that are more difficult to detect, industrialisation of fraud scenarios, reusable attack scripts. Static controls are no longer sufficient. We...</p>
<p>The post <a href="https://www.oneytrust.com/it/ai-at-oneytrust-technology-at-the-heart-of-our-dna/">AI at Oneytrust: technology at the heart of our DNA!</a> appeared first on <a href="https://www.oneytrust.com/it">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 class="wp-block-heading"></h3>



<p><strong>1) Why AI has become essential in the fight against fraud</strong></p>



<p><br>The boom in language models and content generation tools has lowered the barriers to fraud: flawless phishing emails, carefully crafted fake profiles, synthetic identities that are more difficult to detect, industrialisation of fraud scenarios, reusable attack scripts. Static controls are no longer sufficient. <strong>We need systems that are capable of learning, detecting weak signals, and continuously evolving.</strong> AI is not a gadget: it is essential for detecting anomalies, linking scattered events, and responding in real time without hindering legitimate processes.</p>



<p><strong>2) Oneytrust&#8217;s AI toolkit</strong></p>



<p><br>Over the years, <strong>Oneytrust has built a range of scores to analyse digital events, identify fraud patterns and prioritise actions. Our scores aggregate more than 200 signals and are based on a shared database covering more than 15 million consumers, authorised by the CNIL (French Data Protection Authority) in 2013 — well before the GDPR.</strong><br>Beyond fraud at a given moment, we observe velocity: how a user, payment method, device (phone, PC, etc.) or email address behaves over time. This intelligent memory makes it possible to streamline the journey of good customers (controlled reuse of acquired trust) and tighten the noose on risks (accumulation of clues, inconsistencies, anomalies). Our rule engines remain adaptive: we add, adjust and remove rules as trends evolve, to keep pace with changing attacks without compromising the customer experience.</p>



<p><strong>3) Humans + AI: augmented expertise, not automated</strong></p>



<p><br><strong>AI identifies, humans understand.</strong> Our investigators and fraud experts play a particularly crucial role in challenging alerts, contextualising cases, and revealing emerging patterns that models have not yet learned (low volumes, ambiguous signals, attacker innovations). This feedback loop feeds the models, improves the rules, and ensures an explainable decision. In particularly sensitive situations, human arbitration protects the customer relationship, avoids false positives, and maintains trust.</p>



<p><strong>4) A strategy to acculturate our employees to Generative AI</strong></p>



<p><br>As soon as ChatGPT was released in 2022, we quickly decided <strong>to train our teams in the use of generative AI to increase speed, operational efficiency and quality on non-sensitive tasks</strong>: writing, summarising, analysis assistance, preparing deliverables, etc. As part of the BPCE Group, we have access to the secure MAIA portal, which allows our employees to access reference models (e.g. GPT-4o, Mistral, Gemini) in a safe and ethical environment. In our training courses and with the help of our Generative AI Ambassadors, we emphasise the importance of maintaining a critical perspective on the results generated by AI (systematic verification, non-disclosure of sensitive information, traceability of uses): the aim is to accelerate useful production, not to automate indiscriminately.</p>



<p><strong>5) Governance &amp; compliance: already prepared for the AI Act!</strong></p>



<p><br>Because many of our customers are regulated (banks, fintechs, e-merchants), we have long since implemented the safeguards expected by sector regulators: <strong>model documentation, decision logging and auditability, data quality, continuous monitoring, and human supervision.</strong> The AI Act, which has just come into force, reinforces these requirements: we anticipated this framework and are aligning our work with the BPCE Group&#8217;s compliance approach. In concrete terms, this means: system mapping, model risk management, periodic controls, proportionate explainability and team acculturation. Our ambition is to meet deadlines without slowing down useful innovation.</p>



<p><br>In conclusion, let us consider that the fight against fraud is a movement, not something static. AI enables earlier detection, better explanation and faster action — provided it is governed, complemented by humans and integrated without disrupting the user experience. At Oneytrust, it is this winning trio — <strong>high-performance models, committed experts and solid compliance</strong> — that transforms a shifting threat into a sustainable competitive advantage.</p>



<p><strong>Would you like to learn more about the expertise of our models, which combine more than 200 types of data and velocities, and benefit from Oneytrust&#8217;s Data Consortium with more than 15 million digital identities to secure your customer journeys without losing conversions?</strong> <a href="https://www.oneytrust.com/fr/contact/">Contact us.</a></p>



<p></p><p>The post <a href="https://www.oneytrust.com/it/ai-at-oneytrust-technology-at-the-heart-of-our-dna/">AI at Oneytrust: technology at the heart of our DNA!</a> appeared first on <a href="https://www.oneytrust.com/it">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI a strategic asset in the fight against e-Commerce fraud!</title>
		<link>https://www.oneytrust.com/it/ai-a-strategic-asset-in-fight-against-fraud/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Sat, 19 Jul 2025 19:23:38 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=1669</guid>

					<description><![CDATA[<p>At Oneytrust, a long-standing player in the sector for over 25 years, we have turned this dual reality into an opportunity to innovate, by placing AI at the heart of our anti-fraud strategy. How does Oneytrust use Artificial Intelligence to detect fraudulent behaviour?Online fraud is evolving rapidly. Fraudsters are now using tools such as Chat...</p>
<p>The post <a href="https://www.oneytrust.com/it/ai-a-strategic-asset-in-fight-against-fraud/">AI a strategic asset in the fight against e-Commerce fraud!</a> appeared first on <a href="https://www.oneytrust.com/it">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 class="wp-block-heading"></h3>



<p>At Oneytrust, a long-standing player in the sector for over 25 years, we have turned this dual reality into an opportunity to innovate, by placing AI at the heart of our anti-fraud strategy.</p>



<p><strong>How does Oneytrust use Artificial Intelligence to detect fraudulent behaviour?</strong><br>Online fraud is evolving rapidly. Fraudsters are now using tools such as Chat GPT to industrialise their methods: cutting-edge phishing emails, identity theft, automated scam attempts, automated social engineering, etc. It&#8217;s no longer just a handful of malicious experts who are attacking e-commerce sites, but now also opportunistic, inexperienced ‘Sunday fraudsters’ who have no qualms about using AI to achieve their ends.<br>Faced with this growing threat, Oneytrust has decided to counter-attack by deploying its AI-powered anti-fraud solution. With our <strong>D-Risk Commerce</strong> solution, we analyse millions of transactions in real time to :</p>



<ul class="wp-block-list">
<li>Identify anomalous behaviour and emerging fraud networks;</li>



<li>Proactively detect suspicious patterns and transaction anomalies using predictive algorithms;</li>



<li>Maintain a smooth user experience by reducing the friction associated with anti-fraud controls.</li>
</ul>



<p>Our AI models are constantly evolving, fed by a massive volume of anonymised data and enriched by the human expertise of our analysts. T<strong>he result: in 2024, we succeeded in detecting 85.1% of upstream fraud, while identifying 97.3% of false positives &#8211; a performance that makes it possible to secure transactions without penalising legitimate customers</strong>.</p>



<p><strong>The challenges and opportunities of AI in the fight against fraud</strong><br>Today, AI is at the heart of a ‘cat and mouse’ game between fraudsters and e-retailers. With each technological advance, fraud techniques become more sophisticated. The main challenge? Keeping up.<br></p>



<p>But in this race, AI is also a formidable source of opportunities:</p>



<ul class="wp-block-list">
<li>Automated controls: shorter processing times and greater productivity;</li>



<li>Adaptability: algorithms can learn new fraud scenarios in a matter of hours;</li>



<li>Continuous improvement: each fraud detected feeds the models to strengthen future detection.</li>
</ul>



<p>The other major challenge is to find the right balance between security and fluidity. AI that is too strict can block legitimate sales. AI that is too permissive opens the door to fraud. <strong>At Oneytrust, we have made this a priority, by putting human intelligence at the service of artificial intelligence.</strong></p>



<p><br><strong>Artificial intelligence and human expertise: the winning combination</strong><br>At Oneytrust, we don&#8217;t see AI as a miracle solution, but rather as a powerful technological lever, which takes on its full value when combined with human expertise.<br></p>



<p>Our data scientists and fraud experts work hand in hand, and this synergy enables us to :</p>



<ul class="wp-block-list">
<li>Quickly identify new types of fraud not yet detected by our models;</li>



<li>Qualify false positives so that honest customers are not penalised;</li>



<li>React quickly to new attacks or unexpected anomalies;</li>



<li>Continuously update our models, based on detailed analysis of the field.</li>
</ul>



<p>At the same time, our AI algorithms support experts by:</p>



<ul class="wp-block-list">
<li>Prioritising the most sensitive cases;</li>



<li>Correlating key data to save analysis time;</li>



<li>Providing a solid base of insights for informed decision-making.</li>
</ul>



<p>This constant dialogue between AI and our teams enabled us, <strong>in 2024, to boost the transaction transformation rate by 2.04%, while guaranteeing a 99.89% acceptance rate. A double benefit: more sales for e-merchants, and less fraud.</strong></p>



<p><strong>Practical advice for integrating AI into your anti-fraud strategy</strong><br>Would you like to take advantage of AI to strengthen your security? Here are a few best practices:</p>



<ul class="wp-block-list">
<li>Work with an AI and anti-fraud expert partner, such as Oneytrust;</li>



<li>Opt for scalable solutions that can be adapted to your specific business and data flows;</li>



<li>Don&#8217;t rely entirely on technology: retain a degree of human control, particularly to manage the most complex cases;</li>



<li>Monitor your key indicators (fraud rate, false positive rate, conversion rate) to adjust your parameters on an ongoing basis;</li>



<li>Train your teams in the new risks associated with generative AI and social engineering.</li>
</ul>



<p>To conclude, in a world where AI is both an engine for growth and a tool for fraud, it&#8217;s important to arm yourself intelligently. <strong>With Oneytrust, you benefit from the power of AI combined with human expertise, to build an ecosystem of trust around your transactions.</strong> Because tomorrow, true innovation will not just be technological, it will also be ethical, agile… and collaborative.</p><p>The post <a href="https://www.oneytrust.com/it/ai-a-strategic-asset-in-fight-against-fraud/">AI a strategic asset in the fight against e-Commerce fraud!</a> appeared first on <a href="https://www.oneytrust.com/it">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>25 years of fighting fraud: retrospective, changes and the future of e-commerce</title>
		<link>https://www.oneytrust.com/it/25-years-of-fighting-fraud-retrospective-changes-and-the-future-of-e-commerce/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Fri, 11 Jul 2025 14:08:35 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[BNPL]]></category>
		<category><![CDATA[cybercirminalite]]></category>
		<category><![CDATA[DSP3]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[fevad]]></category>
		<category><![CDATA[galerieslafayette]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[identitesynthetique]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=1645</guid>

					<description><![CDATA[<p>From the rise of the Internet to the age of AI: 25 years of change E-commerce has grown by leaps and bounds since the early 2000s, and with it, fraud has continued to evolve. According to the FEVAD figures communicated at this Round Table, 72% of e-retailers are profitable or break-even, which clearly shows that...</p>
<p>The post <a href="https://www.oneytrust.com/it/25-years-of-fighting-fraud-retrospective-changes-and-the-future-of-e-commerce/">25 years of fighting fraud: retrospective, changes and the future of e-commerce</a> appeared first on <a href="https://www.oneytrust.com/it">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 class="wp-block-heading"><strong>From the rise of the Internet to the age of AI: 25 years of change</strong></h3>



<p>E-commerce has grown by leaps and bounds since the early 2000s, and with it, fraud has continued to evolve. According to the FEVAD figures communicated at this Round Table, 72% of e-retailers are profitable or break-even, which clearly shows that e-commerce is a profitable business. And e-commerce is also a job creator, with 41% of e-retailers having created jobs by 2024.</p>



<figure class="wp-block-video"><video controls src="https://www.oneytrust.com/wp-content/uploads/2025/07/table-ronde_v3-360p.mp4"></video><figcaption class="wp-element-caption">Table Ronde Oneytrust du 19 juin 2025, retrospective et perspective du e-commerce ces 25 dernières années</figcaption></figure>



<p><strong>2000-2005: the beginnings of e-commerce</strong></p>



<p>The arrival of the Internet in homes marked the start of a new consumer channel. The first e-commerce sites appeared, often with little security. Fraudulent behaviour remained small-scale, but was already a cause for concern.</p>



<p><strong>2005-2010: the boom in e-commerce… and fraud</strong></p>



<p>E-commerce becomes more democratic with the rise of marketplaces and the first major peaks in online consumption. At the same time, fraud is becoming more structured, targeting payments and technical flaws.</p>



<p><strong>2010-2015: the social networking effect and the expansion of fraud profiles</strong></p>



<p>Facebook, Instagram and other platforms are giving rise to new uses… but also new vectors for fraud. Content linked to fraudulent methods is becoming accessible to everyone. The profile of fraudsters is changing, from organised networks to everyday opportunists.</p>



<p><strong>2015-2020: regulation, PSD2 and increasingly complex payment transactions</strong></p>



<p>The entry into force of PSD2 in Europe (Payment Services Directive) requires strong authentication. The aim is to make payments more secure. As a result, fraudsters are moving to other areas (PayPal disputes, neo-banks, refunds, etc.). Human error is becoming a major target.</p>



<p><strong>2020-2025: industrialisation, cybercrime and AI</strong></p>



<p>The boundaries between fraud and cybercrime are becoming blurred. Attacks are becoming more professional, and fraudsters&#8217; tools are becoming ultra-technical, sometimes doped with AI.</p>



<p>At the same time, merchants are having to cope with tighter regulation (BNPL, consumer credit framework), ever more demanding customer journeys, and increasing pressure on security… without compromising the user experience.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f9e0.png" alt="🧠" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>The next 25 years: human intelligence at the heart of the battle</strong></p>



<p>The next few years promise to be just as decisive. Deepfake, synthetic identities, behavioural fraud and offensive AI are shaking things up.</p>



<p>But one thing remains certain: it is human intelligence that will make the difference. Where automated models can be fooled by a synthetic identity, the human expertise built into our approach can detect anomalies.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f680.png" alt="🚀" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Why merchants need to (re)think their anti-fraud strategy</strong></p>



<p>With fraudsters becoming ever more equipped, merchants&#8217; anti-fraud strategy can no longer rely solely on technology or compliance.</p>



<p>The keys to effective fraud prevention today :</p>



<ul class="wp-block-list">
<li>Combine technical and behavioural approaches</li>



<li>Work with partners who are familiar with emerging patterns</li>



<li>Anticipating regulatory changes (DSP3, IA Act, consumer credit, etc.)</li>



<li>Combining business performance and security</li>
</ul>



<p>It is with this in mind that Oneytrust has been working with the biggest e-commerce players for 25 years. </p>



<p><strong>Our mission: to create trust, without friction.</strong></p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Would you like to find out more about our anti-fraud solutions?</strong></p>



<p>Please contact us.</p>



<p><a href="https://www.oneytrust.com/fr/contact/">Meet our fraud experts</a> and find out how Oneytrust can turn your security into a competitive advantage.</p>



<p>The future of e-commerce is being built today. Together, let&#8217;s build it on trust.</p>



<p></p><p>The post <a href="https://www.oneytrust.com/it/25-years-of-fighting-fraud-retrospective-changes-and-the-future-of-e-commerce/">25 years of fighting fraud: retrospective, changes and the future of e-commerce</a> appeared first on <a href="https://www.oneytrust.com/it">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.oneytrust.com/wp-content/uploads/2025/07/table-ronde_v3-360p.mp4" length="122168083" type="video/mp4" />
<enclosure url="https://www.oneytrust.com/wp-content/uploads/2025/07/table-ronde_v3-360p.mp4" length="122168083" type="video/mp4" />

			</item>
	</channel>
</rss>