<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.fraud.net</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/terms-of-service</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/csr-esg-statement</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resource-center</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/company/follow-us</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/why-us</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/company/about-us</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/company/partnerships</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/company/contact</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/demo-request</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/thank-you</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/technology/global-anti-fraud-network</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/technology/ai-machine-learning</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/technology/intelligent-risk-decisioning</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/industries/payments</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/industries/commerce</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/technology/case-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/technology/advanced-analytics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/technology/data-orchestration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/technology/data-hub</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/company/careers</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/solutions/entity-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/solutions/transaction-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/solutions/entity-screening</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/industries/fintech</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/solutions/fraud-detection-and-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/industries/financial-services</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/trust-center</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/partners-aws</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/onboarding</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/solutions/entity-risk</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/solutions/compliance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/solutions/enterprise-risk-management-platform</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/book-meeting</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/thank-you-newsletter</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/pcn-networking-event-raffle</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/upgrade-without-overhaul</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/berlin-fintech-meetup-raffle</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/demo-request-data-orchestration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/book-meeting-sf</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/fan-conference-dinner-raffle-2026</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/book-meeting-with-payments-team</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/1st-party-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/2fa-two-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/3ds-3d-secure</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/3rd-party-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/419-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/a</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/account-chaining</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/account-enumeration-attack</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/account-opening-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/account-takeover</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/account-velocity-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/ach-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/acquirer-acquiring-bank</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/active-authentication</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/ad-hoc-fraud-reporting</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/address-manipulation-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/advance-fee-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/adversarial-ai</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/adverse-media-screening</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/affiliate-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/agentic-commerce-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/ai-artificial-intelligence</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/ai-explainability</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/ai-model-bias</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/ai-powered-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/ai-powered-identity-verification</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/algorithmic-trading-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/alternative-credit-scoring-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/alternative-data</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/aml-anti-money-laundering</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/aml-audit</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/anomaly-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/anonymous-proxy-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/anti-money-laundering-directive</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/api-injection-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/application-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/application-layer-attacks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/application-spoofing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/arbers</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/asia-pacific-group-on-money-laundering</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/ato-account-takeover</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/australian-aml-ctf-act</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/authorization-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/authorized-push-payment-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/automated-clearing-house-risk</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/automated-decisioning</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/autonomous-attack-orchestration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/autonomous-risk-decisioning</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/avs-address-verification-system</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/b</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/b2b-payment-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/b2c-business-to-consumer</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/back-door</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/backdoor-attacks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/baiting</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/balance-transfer-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/bank-account-verification-apis</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/bank-for-international-settlements-guidelines</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/bank-identification-number</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/bank-note-counterfeit-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/bank-secrecy-act</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/banking-as-a-service</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/bankruptcy-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/basel-iii-framework</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/behavioral-analytics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/behavioral-anomaly-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/beneficial-ownership-identification</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/bin-attack</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/bin-bank-identification-number</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/biometric-authentication</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/biometric-spoofing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/blacklists-whitelists</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/blockchain-analytics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/botnet-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/bounty-scams</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/breach-fatigue</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/breach-notification-laws</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/business-continuity-planning</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/business-email-compromise</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/business-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/business-logic-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/buy-now-pay-later-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/c</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/canadian-proceeds-of-crime</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/card-bin-attacks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/card-cloning</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/card-not-present-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/card-not-received-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/card-skimming</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/carding</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/cash-app-scams</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/cash-transaction-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/catfishing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/cc</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/central-bank-digital-currency-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/certified-fraud-examiner</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/chargeback-abuse-analytics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/chargeback-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/chargeback-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/charity-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/click-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/clickjacking</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/clustering-fraudulent-transactions</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/cnp-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/cognitive-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/cold-wallet-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/commodity-futures-trading-commission</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/compliance-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/compliance-risk-scoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/computer-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/computer-system-penetration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/confirmation-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/consent-based-identity-verification</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/consumer-authentication</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/contactless-payment-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/continuous-authentication</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/continuous-compliance-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/continuous-transaction-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/contract-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/cookie</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/corporate-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/corporate-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/counterfeit-card</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/counterfeit-mobile-banking-apps</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/coupon-discount-abuse</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/crawler</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/credential-harvesting</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/credential-interception-attacks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/credential-stuffing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/credit-card-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/credit-card-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/credit-card-refund-schemes</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/credit-card-testing-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/credit-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/credit-washing-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/cross-border-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/cross-channel-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/cross-device-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/crypto-mixer-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/cryptocurrency-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/cryptogram</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/cryptography</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/current-address-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/customer-due-diligence</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/customer-identity-and-access-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/cvv-card-verification-value</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/cyber-attack-risk-modeling</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/cyber-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/cyber-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/d</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/dark-web</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/dark-web-financial-data-sales</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/dark-web-fraud-intelligence</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/dark-web-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/data-enrichment</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/data-orchestration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/data-points</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/data-poisoning-attacks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/data-protection-act</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/data-provider</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/data-science</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/data-security-standard</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/day-of-the-jackal-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/deep-fake</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/deep-fake-identity-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/deep-packet-inspection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/deep-web</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/deep-web-marketplaces</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/deepfake-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/denial-of-service-attack</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/deposit-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/deposit-kiting</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/derived-identification</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/device-cloning-attacks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/device-emulator</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/device-fingerprinting</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/device-id</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/device-intelligence</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/device-spoofing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/digital-banking-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/digital-identity</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/digital-identity-verification</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/digital-manipulation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/digital-operational-resilience-act</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/digital-signature-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/digital-wallets</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/disbursement-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/disintermediation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/distributed-risk-intelligence</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/diverting-funds</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/document-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/document-tampering-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/dodd-frank-act</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/doorway-domain</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/doorway-page</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/dormant-account-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/double-dipping-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/drop-address</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/dual-use-goods-risk</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/duplicate-payment-schemes</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/dynamic-risk-analysis</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/e</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/e-commerce-apps</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/echeck-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/ecommerce-account-takeovers</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/ecommerce-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/egmont-group-principles</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/eid-services</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/electronic-data-interchange</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/electronic-funds-transfer-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/electronic-verification</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/email-account-compromise</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/email-address</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/email-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/email-tumbling</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/email-verification</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/embedded-fraud-ai</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/emerging-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/emoney-laundering</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/employment-scam</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/emv-chip-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/encryption</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/endpoint-authentication</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/endpoint-protection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/enhanced-due-diligence</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/enhanced-fraud-risk-modeling</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/enterprise-risk-analytics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/entity-graph-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/entity-linking</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/entity-resolution</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/escrow-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/escrow-scams</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/esim-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/european-market-infrastructure-regulation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/exfiltration-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/exit-scam</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/f</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/facial-biometrics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/facial-recognition</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fake-check</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fake-invoice-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fake-merchandise</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/false-account-entries</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/false-declines</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/false-documents</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/false-expense-claims</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/false-expense-reimbursements</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/false-financial-statements</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/false-front-merchants</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/false-identity-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/false-identity-networks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/false-invoices</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/false-kyc-documentation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/false-negative</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/false-negatives</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/false-positive</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/false-positives</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/false-report</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/false-sales-invoices</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/false-travel-claim</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/false-vendors</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/falsified-hours</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/familiar-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fast-identity-online-authentication</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/federated-identity</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/federated-learning-for-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fednow-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fictitious-refunds</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fido</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fiduciary-risk-in-financial-services</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/financial-action-task-force</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/financial-action-task-force-2fb28</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/financial-ai-ethics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/financial-bot-attacks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/financial-risk-stimulation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/financial-stability-board-fsb-standards</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fincen-regulations</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fingerprint-recognition</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fintech-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fintrac-guidelines</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/firewall</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/first-party-chargeback-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/first-party-loan-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/flash-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/flash-loan-attacks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/foreign-account-tax-compliance-act</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/forensic-accounting</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/forged-signatures</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fortune-teller-scam</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/framl</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-analyst</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-analytics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-as-a-service-faas</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-consortium</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-definition</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-department</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-examiner</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-filter</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-lawyers</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-managed-services</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-prevention-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-prevention-specialist</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-response-plan</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-ring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-risk-profile</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-schemes</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-score</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-screening</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-statistics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-triangle</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-upon-the-court</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-vs-abuse</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-vs-forgery</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-vs-theft</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-waste-and-abuse</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraud-waste-and-abuse-training</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraudulent-apps</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fraudulent-recurring-payments</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/friendly-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/full-stack-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/fullz</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/g</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/gaming-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/general-data-protection-regulation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/geo-spoofing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/geo-velocity-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/geographical-ip-detector</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/geolocation-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/ghost-card-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/ghost-employee</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/ghost-employee-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/ghost-terminal</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/ghost-vendor-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/gift-card-scammer-numbers</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/global-address-verification-directories</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/government-benefit-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/government-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/government-procurement-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/gps-spoofer</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/h</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/hacktivist-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/hash</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/healthcare-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/high-risk-industry</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/high-risk-jurisdictions</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/high-risk-merchants</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/honeypot</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/honeypots</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/hong-kong-aml-ctf-ordinance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/host-card-emulation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/hybrid-detection-system</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/i</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/i2p-anonymous-proxy</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/id-spoofing-in-financial-transactions</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/identity-and-access-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/identity-cloning</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/identity-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/identity-fraud-as-a-service-ifaas</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/identity-risk-profiling</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/identity-spoofing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/identity-theft</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/impersonation-scams</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/improper-disclosures</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/in-app-payment-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/incident-response-for-financial-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/insider-threat</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/insider-threats</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/insurance-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/internal-fraud-insider-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/internal-fraud-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/international-accounting-standards</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/international-convention-for-the-suppression-of-the-financing-of-terrorism</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/international-financial-reporting-standards</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/international-organization-of-securities-commissions-iosco-principles</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/interoperability</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/inventory-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/investment-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/invisible-web</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/invoice-factoring-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/iod-impersonation-of-the-deceased-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/iot-botnet</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/iot-payment-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/ip-address-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/ip-address-verification</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/isp-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/issuer-issuing-bank</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/it-risk-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/j</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/japan-act-on-prevention-of-transfer-of-criminal-proceeds</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/jitter</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/junk-data-attacks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/k</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/keystroke-logger</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/kickbacks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/kite-financing-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/know-your-business</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/know-your-customer</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/know-your-merchant</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/know-your-vendor</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/kyc-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/kyc-know-your-customer</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/l</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/layered-security-approach</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/legacy-fraud-prevention-systems</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/level-of-assurance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/liability-shift</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/liveness-bypass</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/liveness-check</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/loan-application-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/loan-default-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/loan-stacking-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/log-file</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/login</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/login-authentication</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/lottery-scam</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/loyalty-points-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/loyalty-program-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/m</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/machine-learning</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/machine-learning-adversarial-attacks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/machine-learning-in-aml-compliance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/machine-learning-risk-scoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/mail-fraud-and-wire-faud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/mail-order-telephone-order</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/malware-based-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/man-in-the-middle</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/man-in-the-middle-attacks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/manpower-direct-and-indirect-costs</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/manual-review</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/market-manipulation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/marketplace</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/marketplace-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/markets-in-financial-instruments-directive-ii-mifid-ii</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/mas-notices-on-aml-cft</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/merchant-account</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/merchant-account-provider</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/merchant-chargeback-insurance-provider</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/merchant-identity-verification</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/merchant-laundering</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/merchant-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/mfa-multi-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/micro-deposit-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/micro-finance-loan-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/mobile-money-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/money-laundering</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/money-mule-networks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/money-mules</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/money-services-business-msb-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/mortgage-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/multi-bank-fraud-prevention-systems</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/multi-entity-fraud-analysis</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/multi-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/multi-layered-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/multi-party-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/n</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/network-effect</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/network-intelligence</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/neural-network-anomaly-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/neural-network-fraud-scoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/new-account-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/non-face-to-face-transaction-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/nonprofit-financial-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/nonrepudiation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/numeric</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/nydfs-part-504</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/o</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/oecd-anti-bribery-convention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/office-of-foreign-assets-control-ofac-regulations</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/omnichannel-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/onboarding-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/one-time-passcode-otp-interception</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/online-marketplace-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/orchestration-layer</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/out-of-band-authentication</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/p</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/p2p-payment-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/pagejacking</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/pass-along-rate</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/passive-authentication</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/password-spraying</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/payables-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/payment-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/payment-gateway</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/payment-gateway-spoofing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/payment-orchestration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/payment-services-directive</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/payment-threshold</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/payment-verification</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/paypal</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/paypal-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/payroll-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/pci-compliance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/pci-dss</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/pci-dss-compliance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/peer-to-peer-lending-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/persona</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/phantom-debt</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/phantom-hacker-scam</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/phantom-merchant-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/pharming</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/pharming-attacks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/phishing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/phishing-and-pharming</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/phishing-kit</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/phishing-schemes</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/phone-porting-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/phone-verification</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/plagiarism</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/platform</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/point-of-sale-pos-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/point-to-point-encryption</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/policy-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/policy-violation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/politically-exposed-person-pep-screening</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/post-type-encyclopedia-p-84993</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/predictive-analytics-for-risk</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/predictive-fraud-analytics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/prepaid-card-abuse</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/privacy</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/processing-unauthorized-payroll</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/prompt-injection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/proofing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/proxy-piercing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/proxy-server-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/pyramid-schemes</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/q</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/quiching-qr-phishing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/r</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/ransomware-attacks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/real-time-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/real-time-payment-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/real-time-sanctions-screening</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/refund-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/regtech</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/regulatory-reporting</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/relying-party</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/remittance-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/remote-access-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/reputation-score-manipulation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/retail-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/retail-loss-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/return-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/return-on-investment-roi</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/reverse-money-laundering</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/risk-based-authentication</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/risk-profiling</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/romance-scams</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/rules-based-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/rules-engine</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/run-of-network-ron</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/s</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/sales-scam</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/sanctions-and-watch-lists</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/sarbanes-oxley-act</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/sca-strong-customer-authentication</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/scareware</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/scholarship-scam</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/scraper</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/script-kiddie</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/second-party-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/secure-element</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/securities-and-exchange-commission-sec-rules</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/self-learning-fraud-prevention-systems</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/serious-fraud-office-sfo</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/shell-companies</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/shopping-cart</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/shoulder-surfing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/sim-cloning</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/sim-swapping</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/single-sign-on</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/skimmer</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/skimming</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/skimming-attacks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/skimming-cash-receipts</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/smart-card</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/smart-contract-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/smishing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/smurfing-structuring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/sniffing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/social-engineering</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/social-media-intelligence</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/social-media-phishing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/software-piracy</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/spear-phishing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/spider</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/state-sponsored-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/str-suspicious-transaction-report</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/subscription-billing-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/supervised-machine-learning</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/supply-chain-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/suspicious-activity-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/suspicious-activity-report</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/sweepstakes-scam</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/swindling</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/synthetic-business-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/synthetic-data</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/synthetic-identity</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/synthetic-identity-creation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/synthetic-identity-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/synthetic-transactions</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/system-integrator</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/t</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/tech-support-scams</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/technology-theft</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/telecommunication-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/test-slug</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/test-slug-2</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/theft-of-assets</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/theft-of-checks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/third-party-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/third-party-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/threat-intelligence-sharing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/timecard-tampering</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/token</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/tokenization</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/tokenization-security</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/tor</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/trade-based-money-laundering-schemes</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/trade-finance-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/transaction-authentication-number</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/transaction-cloaking</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/transaction-fingerprinting</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/transaction-laundering</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/transaction-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/transaction-reversal-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/transaction-screening</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/triangulation-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/triangulation-schemes</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/trojan-horse-malware</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/true-negative</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/true-positive</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/trusted-third-party</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/two-tier-affiliate-program</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/u</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/u2f-universal-2-factor</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/uk-bribery-act</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/ultimate-beneficial-ownership</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/unauthorized-disbursements</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/unauthorized-use-of-assets</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/unauthorized-withdrawals</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/underdelivery</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/unique-identity</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/united-nations-convention-against-corruption</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/unstructured-data-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/unsupervised-machine-learning</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/unusual-activity-reporting-uar</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/url-spoofing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/usa-patriot-act</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/user-behavior-anomaly-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/utility-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/v</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/validation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/velocity-check</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/velocity-filters</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/verified-by-visa-vbv</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/virtual-card-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/virtual-currency-compliance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/vishing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/voice-authorization</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/voice-biometric-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/voice-over-ip</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/voice-phishing-vishing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/w</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/wallet-draining-scams</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/watchlist-screening</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/web-browser</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/web-cloning</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/web-scraping-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/whaling-attack</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/white-collar-financial-crime</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/whitelisted-merchant-exploits</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/whois</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/wire-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/wolfsberg-anti-money-laundering-principles</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/workflows-2</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/write-off-schemes</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/x</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/y</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/z</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/zero-day-exploits</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/glossary/zero-trust-security</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/2020-benchmarking-report-friendly-fraud-download</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/2020-travel-industry-report-download</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/3-common-types-of-fraud-during-a-recession</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/4-key-tech-features-for-effective-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/4-steps-to-prevent-mobile-payment-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/4-ways-ai-creates-convincing-frauds-and-how-it-can-help</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/5-cybersecurity-myths</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/5-steps-for-invoice-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/5-steps-to-turn-compliance-into-competitive-advantage</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/5-top-cybersecurity-and-devops-trends-for-2020</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/5-types-of-merchant-fraud-you-should-know</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/6-actions-to-shield-your-company-from-invoice-and-payment-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/6-strategies-for-holiday-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/7-deadly-risks-for-fintechs-and-financial-institutions</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/7-steps-for-preventing-credit-card-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/7-top-credit-fraud-rings</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/8-fraud-prevention-tools-you-should-immediately-add-to-your-arsenal</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/a-business-guide-to-preventing-ato-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/a-review-of-emerging-generative-ai-regulation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/a-taxonomy-for-understanding-comprehensive-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/a-visual-guide-to-visas-vamp-rule-changes</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/account-takeover-protection-effective-strategies-best-practices</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ach-fraud-why-your-business-should-be-concerned</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/address-check-strengthen-your-fraud-defense-strategy</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/advanced-fraud-solutions</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ai-fraud-prevention-methods-are-needed-for-modern-businesses</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/aml-in-banks-ensuring-regulatory-compliance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/aml-transaction-monitoring-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/an-effective-solution-for-phishing-attacks-with-email-ai</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/analog-identity-digital-identity-and-digital-footprints</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/anti-money-laundering-compliance-against-prepaid-cards</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/artificial-intelligence-pre-crime</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/as-coronavirus-fraud-spikes-some-banks-get-it-and-some-dont</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/automate-your-process-with-fraud-nets-aml-solution</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/award-winning-joint-aml-and-fraud-transaction-monitoring-solution</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/balancing-security-and-simplicity-for-customers-is-key-to-preventing-ato</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/bank-australia-case-study</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/bank-fraud-rises-for-many-amidst-covid-19-revealing-winners-and-losers</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/banking-and-fraud-detection-fact-sheet</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-account-takeover-detection-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-ai-fraud-detection-payments-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-ai-powered-fraud-prevention-platforms</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-ai-tools-for-preventing-payment-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-aml-compliance-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-anti-fraud-solutions-in-fintech</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-anti-money-laundering-software-for-fintech</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-automated-anti-money-laundering-service</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-behavioral-biometrics-fraud-detection-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-chargeback-prevention-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-cross-border-payment-fraud-prevention-platforms</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-ecommerce-fraud-detection-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-enterprise-fraud-prevention-solutions</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-fintech-fraud-management-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-fintech-fraud-prevention-tools</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-fraud-analytics-tools-for-financial-institutions</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-fraud-detection-ai-tools-for-fintechs</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-fraud-detection-platforms-for-online-marketplaces</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-fraud-detection-software-for-e-commerce</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-fraud-detection-software-for-wire-transfers</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-fraud-detection-tools-for-crypto-exchanges</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-fraud-detection-tools-for-online-marketplaces</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-fraud-monitoring-tools-for-p2p-payments</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-fraud-prevention-platforms-for-acquirers</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-fraud-protection-tools-for-high-risk-merchants</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-fraud-risk-scoring-software-for-banks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-identity-fraud-protection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-kyc-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-kyc-verification-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-machine-learning-tools-for-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-merchant-risk-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-payment-fraud-services-for-enterprises</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-real-time-fraud-detection-tools-for-online-payments</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-software-to-reduce-account-takeover-attacks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-solutions-for-new-account-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-solutions-for-refund-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-solutions-to-combat-credit-card-skimming</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-synthetic-fraud-detection-tools-for-banks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-synthetic-identity-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-tools-for-card-not-present-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-tools-for-detecting-mule-accounts</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-tools-for-detecting-payment-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-tools-for-real-time-transaction-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-tools-for-synthetic-identity-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-transaction-monitoring-detection-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-transaction-monitoring-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/best-uses-for-social-media-intelligence-tools</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/beyond-compliance-why-time-to-transact-is-your-most-critical-kpi</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/beyond-the-noise-taming-alert-fatigue-with-machine-learning</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/biases-and-machine-learning</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/big-data-analytics-a-fraud-prevention-game-changer</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/biometric-solutions-for-account-takeover</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/blog-ecommerce-fraud-billions-online-commerce-fraud-threats</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/blog-industry-fraud-report-online-travel-ota-201</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/blog-online-travel-machine-learning-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/blog-top-7-ecommerce-fraud-threats-facing-online-retailers</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/blog-top-fraud-prevention-software-review-sites</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/bnpl-risk-management-3-proactive-measures-for-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/breaking-down-silos-turning-data-chaos-into-clarity</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/bridging-the-acquirer-merchant-trust-gap-with-data-orchestration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/bridging-the-gap-incorporating-ai-ml-into-rules-based-fraud-detection-models</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/build-a-competitive-advantage-with-advanced-aml-technology</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/build-your-defense-against-friendly-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/buy-versus-build-understanding-the-pros-and-cons-for-online-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/card-not-present-fraud-latest-trends-prevention-strategies</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/case-management-console-increase-the-productivity-of-your-fraud-team</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/case-study-amazon-web-services-fraud-net</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/case-study-arvato-gains-increased-agility-with-our-fraud-solution</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/case-study-arvato-integrates-machine-learning-models-to-optimize-fraud-investigations</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/case-study-arvato-turns-to-industry-leading-ai-solution-to-stem-bnpl-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/case-study-canadian-fintech-achieves-frictionless-customer-experience</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/case-study-fraud-net-reduces-account-takeovers-by-90-for-tinka</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/case-study-global-financial-institution-uses-machine-learning-to-prevent-loan-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/case-study-global-payment-processor-reduces-false-positives-by-98</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/case-study-high-flying-travel-agency-increases-revenue-better-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/case-study-leading-ecommerce-brand-tackles-friendly-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/case-study-modernizing-merchant-risk-management-with-seamless-tsys-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/case-study-pacific-dental-improves-compliance-while-decreasing-fraud-risks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/case-study-rules-as-a-service-slashes-false-positive-rates-for-bank-and-fintech-clients</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/case-study-top-5-online-travel-agency-outsmarts-fraudsters-with-enterprise-fraud-prevention-platform</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/case-study-travel-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/cathy-ross-co-founder-of-fraud-net-accepted-into-forbes-business-council</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/cathy-ross-honored-in-inc-s-2023-female-founders-200</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/cathy-ross-honored-with-stevie-award-for-women-in-business</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/cathy-ross-innovation-influences-and-background</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/cathy-ross-interviewed-by-in-touch-networks-on-entrepreneurship</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/cathy-ross-is-a-finalist-for-american-bankers-2024-most-influential-women-in-fintech</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/cathy-ross-is-one-of-the-top-5-dynamic-business-leaders-to-follow</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/cathy-ross-profiled-mastercard-new-york-times</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/cathy-ross-speaks-at-amazon-web-services-startup-cxo-roundtable</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/cathy-ross-spotlighted-in-amazon-web-services-startups-video-series</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/chargeback-fraud-and-customer-experience</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/chargeback-representment-fighting-bogus-chargebacks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/chinese-thieves-exploit-facial-recognition</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/click-fraud-how-do-you-detect-it</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/combat-these-3-types-of-buy-now-pay-later-bnpl-fraud-with-our-artificial-intelligence</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/combatting-synthetic-identity-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/combining-threshold-monitoring-and-anomaly-detection-for-superior-merchant-risk-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/competitive-differentiation-for-fintechs-with-improved-compliance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/create-a-more-secure-digital-customer-journey-this-holiday-season</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/cryptocurrency-fraud-prevention-strategies-and-solutions</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/cybersecurity-facts-figures-predictions</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/dark-web-a-cheat-sheet-for-business-professionals</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/dark-web-monitoring-uncover-hidden-threats-to-protect-your-business</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/data-brokers-and-your-personal-info</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/data-orchestration-is-the-engine-for-scalable-payment-growth</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/database-leaks-data-on-most-of-ecuadors-citizens-including-6-7-million-children</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/debit-vs-credit-card-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/detecting-preventing-new-account-fraud-key-steps-strategies</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/device-check-strengthen-your-fraud-prevention-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/digital-transformation-banks-financial-services</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/do-you-really-know-your-vendor-fight-vendor-fraud-with-ai</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/dont-let-employees-get-caught-by-phishing-scams-this-holiday-season</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/dont-let-fraud-make-it-an-unhappy-holidays</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/drowning-in-alerts-how-false-positives-are-sinking-your-fraud-team</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/e-commerce-fraud-detection-fact-sheet</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-5-steps-to-detect-prevent-synthetic-identity-vendor-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-5-steps-to-prevent-vendor-fraud-with-know-your-vendor-technology</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-7-steps-to-automate-and-accelerate-your-aml-compliance-process</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-8-actions-to-reduce-account-takeover-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-8-actions-to-take-now-to-reduce-insider-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-aml-kyc-and-compliance-for-fintechs</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-building-a-lean-high-impact-fraud-program---understanding-alert-fatigue-and-its-impact-on-your-team</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-buy-versus-build-which-should-you-choose-for-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-covid-fraud-2021</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-do-canadian-banks-have-a-big-phishing-problem</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-effectively-prevent-buy-now-pay-later-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-entity-intelligence-a-game-changer-for-aml-experts</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-fighting-friendly-fraud-with-layered-defense-and-3ds2</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-from-events-to-entity-risk-intelligence</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-how-do-recessions-inflation-and-war-impact-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-minority-report-how-ai-is-making-pre-crime-fraud-detection-a-reality</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-outsmart-financial-fraud-with-ai-and-rules-based-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-protect-your-business-2022-fraud-trends-for-fintech</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-protect-your-customers-this-holiday-season</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-real-time-payments---the-definitive-guide-for-payments-leaders</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-take-these-steps-to-prevent-mobile-payments-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-the-bnpl-paradox-opportunities-and-risks-in-digital-lending</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-the-cost-of-disconnection---how-data-silos-undermine-trust-compliance-and-growth</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-the-definitive-guide-to-real-time-payments</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-the-entity-screening-advantage---faster-onboarding-better-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-the-new-normal-for-cybercrime</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-top-7-risks-for-financial-institutions-and-fintechs</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-transforming-fraud-management---the-case-for-ai-in-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-understanding-and-preventing-invoice-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-why-ai-and-collective-intelligence-are-critical-to-exposing-synthetic-identity-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ebook-your-holiday-fraud-prevention-guide</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/email-check-bolstering-fraud-prevention-with-precision</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/email-wire-fraud-is-so-simple-for-criminals-to-pull-off-its-cost-companies-26-billion-since-2016-says-fbi</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ensignbus-bans-monzo-revolut-customers-from-making-contactless-mobile-payments</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/enterprise-fraud-risk-management-key-insights-best-practices</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/enterprise-travel-fraud-detection-fast-fact-sheet</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/entrepreneurial-outlook-features-cathy-ross-on-the-cover-of-top-10-unstoppable-women-entrepreneurs-of-2025</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/equifax-became-the-first-company-to-have-its-outlook-downgraded-for-a-cyber-attack</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/exploring-the-types-of-bank-fraud-in-financial-services</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/facial-recognition-special-fraud-threats-podcast</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fact-sheet-account-ai</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fact-sheet-ai-machine-learning</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fact-sheet-analytics-and-reporting</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fact-sheet-application-ai</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fact-sheet-appstore</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fact-sheet-case-management-console</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fact-sheet-collective-intelligence-network</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fact-sheet-data-orchestration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fact-sheet-email-ai</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fact-sheet-entity-screening</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fact-sheet-fraud-detection-device-ai</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fact-sheet-know-your-vendor</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fact-sheet-login-ai</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fact-sheet-transaction-ai</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fake-invoices-three-major-cases-of-invoice-fraud-in-2020</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fec-approves-free-cybersecurity-for-campaigns-despite-influence-concerns</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fight-return-fraud-with-these-three-strategies</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fight-synthetic-identity-fraud-with-application-ai</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fighting-back-against-synthetic-identity-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/financial-fraud-in-the-digital-age-emerging-threats-and-countermeasures</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/financial-transaction-monitoring-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fincen-just-rewrote-the-rules-why-effectiveness-now-demands-a-unified-platform</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fintechs-and-compliance-a-time-for-change</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/first-party-fraud-lowers-profits-by-25-percent</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/first-party-fraudster-how-to-recognize-and-avoid-them</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/five-methods-of-banking-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/framl-when-fraud-meets-money-laundering</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-3-0-when-ai-can-mimic-the-ceos-voice</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-alerts-business-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-detection-in-banking-key-challenges-and-solutions</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-detection-in-data-mining-strategies-techniques-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-detection-software-for-banks-should-include-ai</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-detection-systems-strategies-in-the-banking-industry</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-detection-using-machine-learning-vs-rules-based-systems</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-investigations-101-what-you-need-to-know-to-keep-your-business-safe</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-is-the-leading-risk-for-fintechs-and-financial-institutions</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-is-the-leading-risk-for-real-time-payments</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-motive-opportunity-and-rationalization-rising-post-covid</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-50-most-admired-companies-of-the-year-2021-by-the-silicon-review</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-achieves-iso-iec-27001-2022-certification-for-information-security</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-achieves-soc-2-type-2-certification</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-announces-business-partnership-with-market-leader-al-fardan-exchange-l-l-c</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-announces-kyc-compliance-panel-with-diro</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-announces-spanish-language-webinar-with-jumio-transforming-the-user-experience-with-digital-onboarding</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-at-the-mastercard-start-path-summit-2019</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-ceo-whitney-anderson-dubbed-a-2024-cybersecurity-pundit</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-certified-as-a-minority-owned-business-enterprise</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-co-founder-and-president-cathy-ross-wins-stevie-award-for-women-in-business</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-co-founder-cathy-ross-wins-ada-lovelace-special-recognition-award-for-women-in-ict</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-company-overview</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-earns-market-leader-designation-in-customer-success-report-by-featuredcustomers-com</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-expands-global-reach-across-the-middle-east-and-apac</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-feature-release-global-address-verification</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-included-in-fednow-payments-service-provider-showcase</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-integrates-atdata-into-their-risk-management-appstore</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-introduces-entity-screening-to-transform-compliance-and-risk-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-is-one-of-the-five-technyc-cybersecurity-companies-to-watch</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-named-a-2020-red-herring-top-100-north-america-winner</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-named-as-a-top-100-north-america-finalist-by-red-herring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-named-top-performer-in-customer-success-report</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-recognized-as-one-of-the-10-best-cybersecurity-companies-to-watch-in-2024</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-releases-know-your-vendor-kyv-solution</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-secures-patent-for-proprietary-anomaly-detection-methodology</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-secures-soc2-type-2-certification-with-zero-exceptions</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-teams-up-with-people-data-labs-to-enhance-fraud-prevention-and-risk-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-unveils-policy-monitoring-to-strengthen-risk-management-and-policy-compliance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-wins-2024-datos-insights-award-for-joint-aml-and-fraud-transaction-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-wins-cybersecurity-breakthrough-award-for-threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-wins-gold-at-juniper-research-future-digital-awards</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-wins-gold-at-stevie-american-business-awards</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-wins-platinum-award-for-banking-fraud-innovation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-net-wins-platinum-juniper-research-award-for-ai-in-fraud-prevention-innovation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-nets-award-winning-solution-now-available-in-aws-marketplace</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-nets-powerful-policy-monitoring-enhancements-merchant-activity-segmentation-advanced-ui</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-news-may-2021</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-news-roundup-6-18-2021-7-1-2021</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-news-roundup-6-4-2021-6-17-2021</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-news-roundup-7-2-2021-7-15-2021</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-news-roundup-august-13-2021-august-26-2021</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-news-roundup-july-16-2021-july-29-2021</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-news-roundup-july-30-2021-august-12-2021</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-prevention-for-wealth-management-leveraging-ai-technology</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-prevention-system-combining-ai-and-human-experience</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-prevention-trends-2022</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-prevention-within-the-online-travel-industry</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/fraud-risk-factors-how-to-identify-manage-and-mitigate-the-risk-of-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/from-risk-manager-to-growth-driver-how-policy-monitoring-empowers-business-expansion</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/future-of-fraud-2020-insights-from-whitney-anderson-ceo-of-fraud-net</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/future-proofing-compliance-with-automation-and-entity-screening</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/future-proofing-fraud-prevention-trends-and-strategies-with-ai</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/giact-on-payments-29m-wire-fraud-wake-up-call</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/gift-card-fraud-opportunities-and-concerns</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/global-identity-check-elevate-fraud-prevention-with-confidence</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/google-reportedly-attains-quantum-supremacy</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/hackers-selling-business-customer-data-at-bargain-prices</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/have-employees-working-remotely-caused-an-increase-in-your-phishing-incidents-get-control-of-your-inbox</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/help-your-online-fraud-detection-team-survive-the-barrage-of-holiday-fraud-attempts</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/holiday-fraud-trends-2020-holidays-leading-to-payment-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/hospital-data-breaches-could-lead-to-identity-theft-financial-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/how-ai-and-automation-tackle-alert-fatigue-head-on</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/how-ai-is-transforming-the-payments-industry</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/how-artificial-intelligence-is-changing-everything</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/how-can-businesses-weather-fraud-during-a-recession</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/how-can-ip-address-verification-help-prevent-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/how-common-is-fraud-in-australia</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/how-does-credit-card-fraud-affect-businesses</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/how-technology-can-improve-anti-money-laundering-systems</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/how-the-worlds-largest-banks-use-advanced-graph-analytics-to-fight-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/how-to-avoid-cybersecurity-fatigue</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/how-to-balance-online-fraud-detection-amidst-increasing-remote-work</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/how-to-choose-fraud-detection-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/how-to-detect-and-prevent-customer-onboarding-fraud-in-banking</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/how-to-implement-account-takeover-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/how-to-protect-your-business-from-wire-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/how-to-solve-chargeback-fraud-with-strong-layers-of-defense</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/how-to-spot-fraudulent-email-invoices</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/how-to-use-machine-learning-for-fraud-detection-and-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/icba-presentation-email-and-wire-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/identity-theft-and-credit-card-fraud-statistics-for-2019</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/in-the-news-ai-fraud-detection-tools-can-help-fight-rising-e-commerce-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/in-the-news-ai-is-going-to-continue-to-play-a-critical-role-in-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/in-the-news-cathy-ross-featured-in-cxo-outlooks-10-most-inspiring-business-leaders-of-2022</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/in-the-news-fraud-net-achieves-ntis-access-certification</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/in-the-news-fraud-net-appointed-to-federal-reserve-e-invoice-exchange-market-pilot</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/in-the-news-fraud-net-kpmg-jumio-identity-panel</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/in-the-news-fraud-net-listed-as-top-performer-featuredcustomers-fraud-prevention-customer-success-2021</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/in-the-news-fraud-net-recognized-in-2021-gartner-market-guide-for-online-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/in-the-news-fraud-net-wins-platinum-juniper-research-award-for-ai-platform-of-the-year</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/in-the-news-fraud-net-wins-wealth-finance-award-best-ai-driven-fraud-prevention-tech-platform</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/in-the-news-how-aws-helps-fraud-net-use-machine-learning-to-combat-financial-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/in-the-news-how-to-combat-payments-fraud-with-machine-learning-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/in-the-news-identity-verification-tools-fight-financial-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/in-the-news-the-fintechs-building-community-bank-innovation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/in-the-news-to-catch-a-fraudster-those-are-fake-jewels-in-the-mail</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/in-the-news-with-blavity-and-mastercard-in-solidarity-work-and-wealth-in-black-america</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/in-the-news-with-mastercard-standing-up-startups-advice-from-eight-women-fintech-founders</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/increased-fraud-will-be-the-new-normal-post-covid-19</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/industry-benchmarking-elevating-fraud-prevention-strategies</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/insider-fraud-what-it-is-and-how-to-prevent-it</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/internet-of-things-devices-that-are-most-targeted-by-hackers</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/interview-with-whitney-anderson-ceo-of-fraud-net-by-itsecurity-wire</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/introducing-the-new-advanced-credit-cards-where-the-cvvs-will-change-every-hour-a-huge-blow-for-the-cyber-criminals</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/ip-check-reinforce-your-fraud-prevention-measures</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/is-your-screening-program-actually-working-a-self-assessment-checklist-for-entity-screening-solutions</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/isp-monitoring-a-critical-tool-for-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/its-time-for-a-unique-digital-id-for-every-person-in-the-world</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/jumpstart-your-fraud-protection-with-rapid-onboarding</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/know-your-vendor-kyv-best-practices-to-avoid-supplier-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/kyc-aml-compliance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/live-q-and-a</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/loan-apps-exposed-real-time-location-data-on-millions-in-china</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/look-for-these-3-things-in-your-next-fraud-management-solution</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/look-out-for-these-4-types-of-mobile-payments-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/looking-ahead-start-your-post-vaccine-plans-for-invoice-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/machine-learning-fraud-detection-why-custom-models-beat-off-the-shelf-solutions</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/machine-learning-models-debunking-myths-for-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/marketing-fraud-schemes</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/mastercard-selects-fraud-net-to-join-start-path-program-for-innovative-fintechs</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/mastercard-start-path-program</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/mastercard-wades-into-murky-waters</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/meet-whitney-anderson</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/mind-your-own-business-ceos-who-misuse-data-could-end-up-in-jail</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/mitigating-ransomware-risks-with-fraud-nets-email-ai</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/multi-factor-authentication-mfa-strengthening-fraud-defenses-in-fintech</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/navigating-the-risks-of-generative-ai-a-pragmatic-approach-for-banks-fintechs-and-digital-commerce-organizations</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/new-account-fraud-understanding-the-tactics-techniques-of-scammers</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/news-and-social-media-check-strengthen-your-defense-against-emerging-risks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/online-travel-fraud-ota-fraud-threats</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/otas-face-risks-with-online-travel-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/overwhelmed-by-manual-fraud-reviews-heres-how-to-fix-it</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/pandemic-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/panel-discussion-get-ready-for-2022-with-new-kyc-compliance-technologies</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/panel-discussion-new-approaches-to-fraud-prevention-for-canadian-banks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/panel-discussion-stopping-identity-fraud-before-it-occurs-advanced-authentication</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/partner-spotlight-atdata</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/partner-spotlight-veriff</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/payment-processing-security-top-threats-best-practices-to-prevent-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/payments-journal-tough-customers-and-thieves</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/phone-check-enhance-fraud-prevention-across-your-operations</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/podcast-advice-from-a-ciso-ransomware-phishing-and-bec</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/precrime-podcast</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/preparing-for-the-fraud-liability-shift-a-guide-to-the-contingent-reimbursement-model-crm-for-payment-service-providers-and-banks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/press-release-friendly-fraud-can-reduce-online-profits-by-25-fraud-net-study</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/prevent-account-takeover-fraud-with-login-ai</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/product-feature-release-foreign-currency-rules</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/product-feature-release-team-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/protect-your-profits-from-buy-now-pay-later-bnpl-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/protecting-accounts-payable-from-smarter-faster-fraudsters</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/react-llc-raises-the-bar-on-fighting-ad-fraud-by-aligning-with-fraud-net</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/real-time-payments-require-real-time-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/real-time-payments-the-definitive-guide-for-payments-leaders</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/real-time-security-preventing-payment-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/real-world-roi-how-one-payments-company-cut-onboarding-from-6-weeks-to-1-day</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/russian-state-hackers-rarely-share-code-with-one-another</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/santander-uk-fined-107m-by-financial-conduct-authority-for-aml-oversight</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/six-most-sinister-covid-fraud-trends-that-plagued-organizations-in-2020</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/social-engineering-fraud-what-it-is-and-how-to-fight-it</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/stay-ahead-of-vamp-with-these-proactive-fraud-prevention-strategies</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/stop-spear-phishing-attacks-against-your-financial-institution-with-smarter-tools</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/stop-swivel-chair-risk-management-with-a-unified-data-layer</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/stop-the-silos-unify-fraud-compliance-and-credit-risk</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/stopping-ai-generated-phishing-and-other-new-phishing-schemes-requires-a-strong-shield</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/stopping-synthetic-identity-bnpl-fraud-with-application-ai</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/streamline-fraud-prevention-with-ai-powered-case-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/strong-identity-verification-as-a-competitive-advantage</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/synthetic-identity-fraud-is-proving-to-be-challenging-and-stealthy</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/synthetic-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/tackling-insurance-fraud-effective-detection-methods</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/take-back-your-profit-and-stop-friendly-fraud-now</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/take-charge-chargeback-protection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-5-most-common-financial-crimes</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-advantages-of-ai-in-fraud-prevention-building-a-stronger-defense</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-alert-that-should-have-been-an-auto-decision-lessons-from-high-performing-fraud-teams</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-crucial-connection-between-bnpl-and-risk-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-four-major-challenges-of-friendly-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-fraud-prevention-maturity-model-what-it-is-and-how-to-use-it</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-fraud-triangle</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-growing-threat-of-generative-ai-fraud-in-banking-finance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-hidden-cost-of-alert-fatigue-fraud-losses-talent-retention-brand-risk</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-importance-of-consortium-data-for-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-most-common-fintech-fraud-in-south-africa</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-need-for-traditional-controls-and-ai-decisioning-in-a-real-time-banking-and-payments-world</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-online-fraud-solution-you-need-detecting-fraud-with-transaction-ai</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-real-cost-of-disconnection-why-your-spreadsheet-is-a-risky-system-of-record</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-rise-of-buy-now-pay-later-fraud-how-to-protect-your-business-customers</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-rising-threat-of-authorized-push-payment-fraud-what-you-should-know</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-risks-of-vamp-non-compliance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-venture-center-fraud-prevention-founder-feature-whitney-anderson</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-white-house-launches-ai-gov</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/the-year-ahead-in-fraud-what-stays-the-same-what-changes</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/this-is-the-latest-advancement-in-fraud-detection-using-machine-learning</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/three-sneaky-fraud-types-blooming-during-covid-19</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-3-skills-of-certified-fraud-examiners</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-5-security-and-compliance-challenges-of-open-banking</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-7-insider-threat-examples-you-can-learn-from</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-7-steps-for-preventing-loan-application-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-aml-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-aml-software-for-banks</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-chargeback-fraud-prevention-software-providers</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-fintech-fraud-detection-services</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-fraud-case-management-software-solutions</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-fraud-detection-tools-for-crypto-exchanges</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-fraud-prevention-services-for-remittance-providers</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-fraud-prevention-trends-shaping-the-financial-sector</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-kyc-and-aml-solutions-for-businesses</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-merchant-fraud-monitoring-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-real-time-payment-fraud-prevention-platform</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-refund-fraud-prevention-software-solutions</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-risk-management-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-six-fraud-prevention-technologies-and-tactics-to-tackle-fraud-in-2021</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-three-ways-to-prevent-friendly-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-tools-for-chargeback-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-tools-for-detecting-online-payment-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-tools-for-geolocation-based-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/top-transaction-fraud-monitoring-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/transaction-ai-halting-buy-now-pay-later-fraud-for-your-business</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/transaction-monitoring-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/transaction-monitoring-the-key-to-effective-risk-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/transaction-monitoring-vs-policy-monitoring-choosing-the-right-merchant-risk-monitoring-solution-for-your-business</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/transaction-security-best-practices-in-2023</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/understanding-account-takeover-fraud-prevention-protection-strategies</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/understanding-the-entity-approach-to-financial-crime-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/unmatched-refunds-detecting-abuse-with-data-orchestration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/using-ai-to-prevent-credit-card-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/using-machine-learning-to-prevent-identity-theft</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/using-technology-to-fight-account-takeover</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/vendor-compliance-management-importance-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/video-8-actions-to-reduce-account-takeover-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/video-anomaly-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/video-case-management-portal</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/video-ebook-5-steps-to-prevent-vendor-fraud-with-kyv-technology</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/video-ebook-buy-or-build-your-online-fraud-prevention-solution</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/video-ebook-look-out-for-these-financial-technology-fraud-trends</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/video-ebook-prevent-buy-now-pay-later-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/video-ebook-recessions-fraud-schemes</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/video-ebook-the-new-normal-for-cybercrime-covid-fraud-schemes</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/video-email-shield-product-overview</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/video-entity-analysis-demo</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/video-fraud-prevention-analytics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/video-no-time-to-lose-ai-driven-fraud-in-real-time-payments-rtp</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/video-real-time-payments-fraud-prevention-with-whitney-anderson</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/videos-and-product-demos</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/visa-acquirer-monitoring-program-vamp-compliance-with-policy-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/visas-vamp-thresholds-drop-to-1-5-on-april-1-are-you-ready</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/voter-fraud-and-how-to-prevent-it</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/we-warned-you-the-billion-agent-threat-is-here</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar---mission-compliance---orchestrating-order-from-data-chaos</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-api-marketplaces-for-stronger-fraud-prevention-and-risk-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-arvato-and-fraud-net-ceo-discuss-best-practices-of-combining-ai-and-manual-reviews-to-reduce-online-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-australian-bank-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-automating-and-accelerating-your-aml-processes</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-beyond-checklists---building-dynamic-compliance-through-intelligent-data-flows</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-beyond-compliance---transforming-client-experience-through-intelligent-data</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-beyond-transaction-monitoring---the-strategic-shift-to-entity-intelligence-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-changing-the-game-leveraging-entity-monitoring-for-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-cloud-based-fraud-protection-for-banks-in-the-eu</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-cloud-based-fraud-protection-in-africa</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-demystifying-compliance-for-real-time-payments</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-fraud-during-the-covid-19-pandemic-a-year-in-review</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-friendly-fraud-2020-report</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-from-manual-to-automated-the-future-of-merchant-screening</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-from-reactive-to-proactive-transforming-merchant-risk-management-with-policy-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-from-silos-to-symphony---why-data-orchestration-is-the-future-of-compliance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-how-ai-and-machine-learning-enhance-risk-scoring-and-revenue</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-online-travel-fraud-2020-report</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-protect-your-customers-company-this-holiday-season</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-reducing-the-risk-of-fraud-for-fis-with-bankjoy</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-stop-being-nice-to-friendly-fraud-with-a-layered-defense-and-3ds2</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-the-great-data-symphony---turning-compliance-into-competitive-power</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-the-power-of-collaboration-data-consortiums-for-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-transforming-the-user-experience-with-digital-onboarding-with-jumio</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/webinar-why-ai-and-collective-intelligence-are-critical-to-exposing-synthetic-identity-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/week-in-fraud-podcast-department-of-justice-covid19</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/what-gets-monitored-gets-protected-advanced-continuous-email-monitoring-to-prevent-invoice-fraud-and-phishing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/what-is-a-collective-intelligence-network</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/what-is-a-fraud-bible</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/what-is-application-fraud-understanding-its-impact-on-businesses</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/what-is-chargeback-fraud-and-how-do-i-prevent-it</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/what-is-merchant-activity-segmentation-transforming-alert-prioritization</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/what-is-synthetic-identity-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/what-is-the-best-option-build-or-buy-your-online-fraud-prevention-solution</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/what-is-transaction-monitoring-and-why-is-it-crucial-in-aml</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/what-nobody-tells-you-about-machine-learning</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/when-the-frontier-ai-models-become-the-adversary</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/where-the-frauds-are-all-legal</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/whitepaper-what-should-merchants-and-acquirers-do-about-visas-new-vamp</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/who-is-behind-billions-in-retail-banking-fraud-threats</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/why-arent-more-financial-institutions-using-ai-to-fight-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/why-businesses-are-turning-to-data-driven-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/why-chargeback-protection-is-important</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/why-data-is-the-key-to-anti-money-laundering-compliance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/why-fragmented-risk-data-is-holding-payments-back-infographic</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/why-google-thinks-machine-learning-will-be-a-game-changer-for-travel</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/why-is-account-takeover-fraud-increasing</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/why-phone-numbers-stink-as-identity-proof</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/why-synthetic-identity-fraud-is-increasing-in-popularity</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/resources/wise-com-fined-by-abu-dhabi-watchdog-for-failing-aml-compliance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/careers/frontend-developer</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/careers/go-to-market-manager</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/careers/sales-account-executive</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/careers/sales-manager-director</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/careers/senior-backend-developer</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/thank-you/ebook-from-events-to-entity-risk-intelligence</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/case-studies/fraud-reduction-breakthrough-for-uk-fintech</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/case-studies/high-flying-travel-agency-increases-revenue-with-better-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/case-studies/leading-financial-institution-takes-fraud-prevention-to-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/case-studies/merchant-services-provider-cuts-alert-fatigue-by-95-with-intelligent-threshold-rules</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/case-studies/mobile-payment-network-scales-operations-with-real-time-transaction-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/case-studies/multicurrency-payments-company-breaks-down-data-silos-across-risk-teams</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/case-studies/national-card-processor-replaces-legacy-system-with-modern-merchant-risk-platform</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/case-studies/payment-processor-conquers-alert-fatigue-with-95-alert-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/case-studies/payment-services-provider-defeats-card-testing-attack-and-reduces-fraud-by-78</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/case-studies/protecting-high-risk-ecommerce-from-sophisticated-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/case-studies/streamlining-fraud-prevention-for-leading-african-payments-company</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/account-takeover-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/account-takeover-prevention-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-adaptive-fraud-rules</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-ai-fraud-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-ai-risk-scoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-api-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-automated-payment-approvals</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-card-network-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-chargeback-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-cloud-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-cost-effective-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-cross-network-risk</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-end-to-end-fraud-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-evolving-fraud-tactics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-false-positive-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-fraud-alert-fatigue</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-fraud-case-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-fraud-control-effectiveness</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-fraud-customer-experience</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-fraud-investigation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-fraud-investigation-workflows</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-fraud-management-inefficiency</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-fraud-spreadsheet-alternative</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-fraud-tool-security</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-fraud-trend-visualization</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-frictionless-cx</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-future-proof-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-high-risk-merchants</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-high-volume-transaction-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-intelligent-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-legacy-it-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-major-fraud-loss-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-merchant-risk-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-merchant-risk-scoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-real-time-analytics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-real-time-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-real-time-fraud-visibility</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-real-time-transaction-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-regulatory-fine-avoidance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-reputation-damage-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-secure-global-operations</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/acquirer-siloed-data-visibility</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/aml-transaction-monitoring-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-automated-payment-approvals</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-account-takeover-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-adaptive-fraud-rules</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-ai-fraud-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-ai-risk-scoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-api-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-card-network-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-chargeback-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-cloud-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-cost-effective-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-cross-network-risk</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-end-to-end-fraud-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-evolving-fraud-tactics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-false-positive-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-fraud-alert-fatigue</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-fraud-case-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-fraud-control-effectiveness</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-fraud-customer-experience</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-fraud-investigation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-fraud-investigation-workflows</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-fraud-loss-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-fraud-management-inefficiency</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-fraud-spreadsheet-alternative</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-fraud-tool-security</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-fraud-trend-visualization</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-frictionless-cx</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-future-proof-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-high-risk-merchants</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-high-volume-transaction-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-high-volume-transaction-fraud-5c9d8</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-intelligent-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-legacy-it-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-merchant-risk-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-merchant-risk-scoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-real-time-analytics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-real-time-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-real-time-fraud-visibility</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-real-time-transaction-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-regulatory-fine-avoidance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-reputation-damage</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-secure-global-operations</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/b2b-payment-siloed-data-visibility</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/bank-fraud-detection-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/behavioral-fraud-detection-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/card-not-present-fraud-detection-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/chargeback-prevention-platform</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cost-effective-fraud-detection-for-payment-companies</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-account-takeover-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-ai-fraud-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-api-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-automated-fraud-triage</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-automated-payment-approvals</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-cloud-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-cost-effective-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-cross-network-risk</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-end-to-end-fraud-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-evolving-fraud-tactics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-false-positive-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-fraud-alert-fatigue</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-fraud-control-effectiveness</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-fraud-customer-experience</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-fraud-investigation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-fraud-investigation-workflows</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-fraud-loss-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-fraud-management-inefficiency</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-fraud-spreadsheet-alternative</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-fraud-tool-security</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-fraud-trend-visualization</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-frictionless-cx</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-future-proof-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-high-risk-merchants</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-high-volume-transaction-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-intelligent-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-legacy-it-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-merchant-risk-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-real-time-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-real-time-fraud-visibility</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-real-time-transaction-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-regulatory-fine-avoidance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-reputation-damage</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-secure-global-operations</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/cross-border-siloed-data-visibility</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/customer-due-diligence-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/data-orchestration-platform</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/digital-fraud-prevention-solution</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/digital-payment-fraud-prevention-platform</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/enhanced-due-diligence-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/enterprise-case-management-solution</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/financial-crime-prevention-platform</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/fraud-analytics-platform</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/fraud-case-management-platform</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/fraud-detection-api</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/fraud-detection-automation-solution</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/fraud-detection-service</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/fraud-investigation-solution</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/fraud-management-platform-e1a7e</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/fraud-monitoring-solution</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/fraud-prevention-service</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/fraud-ring-detection-solution</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-account-takeover-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-adaptive-fraud-rules</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-ai-fraud-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-ai-risk-scoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-api-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-automated-payment-approvals</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-card-network-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-chargeback-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-cloud-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-cost-effective-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-cross-network-risk</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-end-to-end-fraud-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-evolving-fraud-tactics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-false-positive-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-fraud-alert-fatigue</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-fraud-case-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-fraud-control-effectiveness</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-fraud-customer-experience</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-fraud-investigation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-fraud-investigation-workflows</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-fraud-spreadsheet-alternative</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-fraud-tool-security</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-fraud-trend-visualization</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-frictionless-cx</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-future-proof-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-high-volume-transaction-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-intelligent-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-legacy-it-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-major-fraud-loss-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-merchant-risk-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-real-time-analytics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-real-time-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-real-time-fraud-visibility</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-real-time-transaction-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-regulatory-fine-avoidance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-reputation-damage-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-secure-global-operations</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/issuer-siloed-data-visibility</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/kyb-screening-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/online-payment-fraud-prevention-platform</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-account-takeover-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-ai-fraud-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-api-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-automated-fraud-triage</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-automated-payment-approvals</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-chargeback-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-cost-effective-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-cross-network-risk</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-evolving-fraud-tactics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-fraud-alert-fatigue</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-fraud-case-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-fraud-control-effectiveness</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-fraud-customer-experience</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-fraud-investigation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-fraud-investigation-workflows</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-fraud-spreadsheet-alternative</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-fraud-trend-visualization</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-high-volume-transaction-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-intelligent-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-major-fraud-loss-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-real-time-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-real-time-transaction-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-reputation-damage-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/p2p-siloed-data-visibility</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-account-takeover-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-adaptive-fraud-rules</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-ai-fraud-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-ai-risk-scoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-api-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-automated-approvals</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-automated-fraud-triage</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-card-network-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-chargeback-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-cloud-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-cross-network-risk</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-end-to-end-fraud-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-evolving-fraud-tactics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-false-positive-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-fraud-case-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-fraud-control-effectiveness</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-fraud-customer-experience</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-fraud-investigation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-fraud-investigation-workflows</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-fraud-loss-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-fraud-management-inefficiency</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-fraud-spreadsheet-alternative</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-fraud-tool-security</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-fraud-trend-visualization</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-frictionless-cx</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-future-proof-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-high-risk-merchants</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-high-volume-transaction-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-intelligent-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-legacy-it-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-merchant-risk-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-merchant-risk-scoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-real-time-analytics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-real-time-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-real-time-fraud-visibility</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-real-time-transaction-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-regulatory-fine-avoidance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-reputation-damage</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-secure-global-operations</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-company-siloed-data-visibility</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-fraud-alert-fatigue</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-account-takeover</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-adaptive-fraud-rules</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-ai-fraud-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-ai-risk-scoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-api-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-automated-approvals</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-automated-fraud-triage</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-card-network-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-chargeback-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-cloud-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-cost-effective-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-cross-network-risk</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-end-to-end-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-evolving-fraud-tactics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-false-positive-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-faster-merchant-onboarding</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-fraud-control-effectiveness</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-fraud-customer-experience</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-fraud-investigation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-fraud-investigation-workflows</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-fraud-management-inefficiency</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-fraud-spreadsheet-alternative</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-fraud-spreadsheet-alternative-99138</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-fraud-tool-security</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-fraud-trend-visualization</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-frictionless-cx</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-future-proof-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-high-volume-transaction-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-intelligent-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-legacy-it-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-major-fraud-loss</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-merchant-risk-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-merchant-risk-scoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-real-time-analytics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-real-time-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-real-time-fraud-visibility</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-real-time-transaction-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-regulatory-fine-avoidance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-reputation-damage</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-secure-global-operations</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payment-processor-siloed-data-visibility</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/payments-fraud-prevention-solution</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/pep-screening-solution</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-account-takeover-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-adaptive-fraud-rules</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-ai-fraud-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-ai-risk-scoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-api-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-automated-fraud-triage</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-automated-payment-approvals</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-card-network-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-chargeback-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-cloud-fraud-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-cost-effective-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-cross-network-risk</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-end-to-end-fraud-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-evolving-fraud-tactics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-false-positive-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-fraud-alert-fatigue</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-fraud-alert-fatigue-ef9c7</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-fraud-case-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-fraud-control-effectiveness</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-fraud-customer-experience</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-fraud-investigation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-fraud-investigation-workflows</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-fraud-management-inefficiency</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-fraud-tool-security</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-fraud-trend-visualization</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-frictionless-cx</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-future-proof-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-high-risk-merchants</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-high-volume-transaction-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-intelligent-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-legacy-it-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-major-fraud-loss-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-merchant-risk-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-merchant-risk-scoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-real-time-analytics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-real-time-analytics-2a0a7</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-real-time-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-real-time-fraud-visibility</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-real-time-transaction-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-regulatory-fine-avoidance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-reputation-damage-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-secure-global-operations</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/psp-siloed-data-visibility</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/real-time-fraud-detection-solution</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/real-time-transaction-monitoring-solution</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-account-takeover-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-ai-fraud-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-api-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-automated-fraud-triage</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-automated-payment-approvals</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-cost-effective-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-cross-network-risk</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-end-to-end-fraud-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-evolving-fraud-tactics</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-faster-merchant-onboarding</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-fraud-alert-fatigue</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-fraud-case-management</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-fraud-control-effectiveness</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-fraud-customer-experience</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-fraud-investigation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-fraud-investigation-workflows</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-fraud-loss-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-fraud-spreadsheet-alternative</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-fraud-trend-visualization</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-fraud-trend-visualization-1fb8a</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-high-risk-merchants</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-high-volume-transaction-fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-intelligent-automation</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-legacy-it-integration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-merchant-risk-reduction</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-merchant-risk-scoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-real-time-fraud-detection</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-real-time-fraud-visibility</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-real-time-transaction-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-reputation-damage-prevention</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/remittance-siloed-data-visibility</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/risk-management-platform</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/sanctions-screening-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/suspicious-transaction-monitoring-software</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/services/transaction-fraud-detection-platform</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories/acquirers</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories/ai-and-machine-learning</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories/aml-kyc-compliance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories/business-to-business-b2b-payments</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories/case-management-reporting</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories/compliance</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories/cross-border-payments</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories/data-orchestration</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories/entity-monitoring</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories/entity-risk</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories/entity-screening-and-onboarding</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories/fraud</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories/issuers</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories/p2p-payments</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories/payment-processors</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories/payment-service-providers-psps</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories/real-time-payments</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories/remittance-companies</loc>
    </url>
    <url>
        <loc>https://www.fraud.net/service-categories/transaction-monitoring</loc>
    </url>
</urlset>