Definition:
Intelligence-sharing mechanisms used to widely disseminate tactical fraud intelligence like mule accounts, phishing sites, malware distribution sites, compromised websites, botnet IP addresses, compromised point-of-sale terminals, etc. Abuse lists may be private (available on subscription or as part of a larger fraud detection solution) or public.
Learn more about Kount