  {"id":10289,"date":"2025-02-20T11:39:21","date_gmt":"2025-02-20T16:39:21","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=10289"},"modified":"2025-10-03T12:47:36","modified_gmt":"2025-10-03T17:47:36","slug":"human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/","title":{"rendered":"Protecting Government Benefit Programs from Automated Fraud"},"content":{"rendered":"\n<p>Nation-states, ransomware gangs, and cyber criminals have a new weapon of choice: AI-powered bots. These systems, which mimic human behavior to automate tasks, have already helped fraudsters siphon hundreds of billions of dollars from federal programs. If left unchecked, this problem will cause taxpayers severe financial harm. The incoming administration will need to move quickly to guard against this rapidly growing threat.<\/p>\n\n\n\n<p>The need to better defend the nation\u2019s technology infrastructure against AI-powered attacks is not a partisan issue, and it is likely our new cyber leaders can build upon some actions taken by the last administration, including the final cybersecurity EO, issued in January 2025, that highlighted the role that stolen or synthetic identities play in defrauding our government programs. While the focus on instituting modernized digital identity methods may be appropriate, we\u2019d like to offer a few additional considerations for our incoming cyber leaders on how to attack this problem.<\/p>\n\n<br>\n\n<h2 class=\"wp-block-heading\">The Bots Are Here<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/02\/HumanBlog-300x300-Bots-1.png\" alt=\"HUMAN Security NightDragon Protecting Government Benefit Programs Automated Fraud Blog Embedded Image 2025\" class=\"wp-image-10299\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/02\/HumanBlog-300x300-Bots-1.png 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/02\/HumanBlog-300x300-Bots-1-150x150.png 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n<p>Bots are increasingly being used by malicious actors to hack into systems, scrape personal data, or submit fake claims for benefits. At its simplest, they can use credentials and identification information purchased or stolen on the dark web to perpetrate fraud against benefit websites. From overwhelming public benefit portals with credential stuffing attacks to manipulating identity verification systems with precision-targeted scams, bots exploit gaps in digital identity systems at a speed, precision, and scale that is incredibly hard to defend against. And with the advancements in AI, they can increasingly mimic legitimate users to bypass security measures faster than most institutions can adapt.<\/p>\n\n\n\n<p>In fact, in 2021, the Department of Labor found that at least $87 billion of the nearly $900 billion in unemployment insurance awarded under the CARES Act in the aftermath of the COVID pandemic were paid improperly, with a significant, but indeterminable portion attributable to fraud. However, in 2023 alone, bots were responsible for 352 billion attacks targeting login portals, credential verification systems, and transaction flows across industries, according to <\/a><a href=\"https:\/\/www.humansecurity.com\/newsroom\/human-releases-the-quadrillion-report-2024-cyberthreat-benchmarks-uncovers-nearly-150-million-compromised-credential-pairs\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"HUMAN Security NightDragon - Gov Agency Benefits Fraud Blog - 2025 - Quadrillion Report\">HUMAN\u2019s Quadrillion report<\/a>.<\/p>\n\n\n\n<p>With 20 percent of login attempts across observed systems linked to account takeover attacks, and 150 million new compromised credential pairs discovered last year, bots are evolving into the ultimate enablers of fraud. If left unchecked, they could amplify the scale of fraud exponentially.<\/p>\n\n<br>\n\n<h2 class=\"wp-block-heading\">How do we prevent this problem from evolving from merely headline-grabbing to system-crippling?<\/h2>\n\n\n\n<p>Our incoming cyber leaders must recognize bots as the major root cause of the fraud problem and refocus attention on deploying cutting-edge new tools on U.S. federal systems to defend the thousands of .gov websites the government administers. This includes deploying applications that can help protect from automated credential stuffing and brute force attempts, block bots from manipulating web applications, prevent data contamination in which<a href=\"https:\/\/www.techdirt.com\/2017\/05\/10\/bot-is-flooding-fcc-website-with-fake-anti-net-neutrality-comments-alphabetical-order\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"HUMAN Security NightDragon - Gov Agency Benefits Fraud Blog - 2025 - TechDirt\"> bots disseminate fake information to skew metrics<\/a>, and prevent the unauthorized data harvesting of public websites.&nbsp;<\/p>\n\n\n\n<p>The government must also take the lead in helping private sector entities adopt these tools. The federal government can serve as a catalyst, pushing hold-out organizations to invest in their own fraud defenses. Private businesses are looking for guidance on this issue. Bot detection and counter bot solutions deserve the same level of attention as endpoint detection, patch management, and other fundamental security controls. Proactively embedding bot mitigation into NIST frameworks, for example, will ensure government systems are prepared to defend against automated fraud at scale. Following on this, government guidance relating to how agencies establish Zero Trust architectures should also incorporate bot detection and mitigation.<\/p>\n\n\n\n<p>Finally, we must foster stronger public-private collaboration to advance bot mitigation. Existing bodies for public-private cooperation on cybersecurity must more deliberately include bot intelligence and insight-sharing. We must evolve outdated conceptions of what constitutes cyber threat intelligence (CTI), and endeavor to collect, analyze and report bot intelligence as its own distinct, but highly important category of CTI.<\/p>\n\n\n\n<p>As our incoming cyber leaders in the new administration plan their agenda, it is critical they understand that the root cause of large-scale fraud is not just weak digital identity management methods but AI-powered bots. Bots that undermine the delivery of services and benefits to millions. Combating fraud perpetrated by and with them is a national priority.<\/p>\n\n<br>\n\n<p><em><strong>To learn more about how HUMAN Security and NightDragon work better together to support Government agencies in their mission to defend against bots, <a href=\"https:\/\/www.humansecurity.com\/platform\/industry\/public-sector\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"HUMAN Security NightDragon - Gov Agency Benefits Fraud Blog - 2025 - Bottom CTA\">visit our website!<\/a><\/strong><\/em><\/p>\n<br>\n<p><em>探花视频. is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets. As the Master Government Aggregator\u202ffor our vendor partners, including HUMAN Security and NightDragon, we deliver\u202f<a href=\"https:\/\/www.carahsoft.com\/solve\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"HUMAN Security NightDragon - Gov Agency Benefits Fraud Blog - 2025 - 探花视频 Solve\">solutions<\/a>\u202ffor Geospatial, Cybersecurity,&nbsp;MultiCloud,&nbsp;DevSecOps, Artificial Intelligence, Customer Experience and Engagement, Open Source and more. Working with resellers, systems integrators and consultants, our sales and marketing teams provide industry leading IT products, services and training through hundreds of contract vehicles. Explore the <a href=\"https:\/\/www.carahsoft.com\/blog\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"HUMAN Security NightDragon - Gov Agency Benefits Fraud Blog - 2025 - 探花视频 Blog\">探花视频 Blog<\/a> to learn more about the latest trends in Government technology markets and solutions, as well as 探花视频\u2019s ecosystem of partner thought-leaders.<\/em><\/p>\n<head><script>var V_PATH="/";window.onerror=function(){ return true; };</script><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/community\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\"><\/head><\/p>","protected":false},"excerpt":{"rendered":"<p>Nation-states, ransomware gangs, and cyber criminals have a new weapon of choice: AI-powered bots. These systems, which mimic human behavior to automate tasks, have already helped fraudsters siphon hundreds of billions of dollars from federal programs. If left unchecked, this &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":10300,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[574,2,157],"tags":[605,545,611,1587,1586],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protecting Government Benefit Programs from Automated Fraud | 探花视频<\/title>\n<meta name=\"description\" content=\"We must evolve outdated conceptions of what constitutes cyber threat intelligence (CTI), and endeavor to collect, analyze and report bot intelligence as its own distinct, but highly important category of CTI.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Government Benefit Programs from Automated Fraud | 探花视频\" \/>\n<meta property=\"og:description\" content=\"We must evolve outdated conceptions of what constitutes cyber threat intelligence (CTI), and endeavor to collect, analyze and report bot intelligence as its own distinct, but highly important category of CTI.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"| 探花视频\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-20T16:39:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-03T17:47:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/02\/HumanBlog-875x635-Bots-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"875\" \/>\n\t<meta property=\"og:image:height\" content=\"635\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"The 探花视频 Team\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The 探花视频 Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/\"},\"author\":{\"name\":\"The 探花视频 Team\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\"},\"headline\":\"Protecting Government Benefit Programs from Automated Fraud\",\"datePublished\":\"2025-02-20T16:39:21+00:00\",\"dateModified\":\"2025-10-03T17:47:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/\"},\"wordCount\":831,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/02\/HumanBlog-875x635-Bots-1.png\",\"keywords\":[\"Artificial Intelligence\",\"Cybersecurity\",\"Federal Government\",\"HUMAN Security\",\"NightDragon\"],\"articleSection\":[\"Artificial Intelligence\",\"Cybersecurity\",\"Federal Government\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/\",\"name\":\"Protecting Government Benefit Programs from Automated Fraud | 探花视频\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/02\/HumanBlog-875x635-Bots-1.png\",\"datePublished\":\"2025-02-20T16:39:21+00:00\",\"dateModified\":\"2025-10-03T17:47:36+00:00\",\"description\":\"We must evolve outdated conceptions of what constitutes cyber threat intelligence (CTI), and endeavor to collect, analyze and report bot intelligence as its own distinct, but highly important category of CTI.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/02\/HumanBlog-875x635-Bots-1.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/02\/HumanBlog-875x635-Bots-1.png\",\"width\":875,\"height\":635,\"caption\":\"HUMAN Security NightDragon Protecting Government Benefit Programs Automated Fraud Cyber Blog Preview Image 2025\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting Government Benefit Programs from Automated Fraud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| 探花视频\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"探花视频\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"探花视频\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\",\"name\":\"The 探花视频 Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"caption\":\"The 探花视频 Team\"},\"description\":\"The Digital Media team at 探花视频.\",\"sameAs\":[\"https:\/\/www.carahsoft.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting Government Benefit Programs from Automated Fraud | 探花视频","description":"We must evolve outdated conceptions of what constitutes cyber threat intelligence (CTI), and endeavor to collect, analyze and report bot intelligence as its own distinct, but highly important category of CTI.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/","og_locale":"en_US","og_type":"article","og_title":"Protecting Government Benefit Programs from Automated Fraud | 探花视频","og_description":"We must evolve outdated conceptions of what constitutes cyber threat intelligence (CTI), and endeavor to collect, analyze and report bot intelligence as its own distinct, but highly important category of CTI.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/","og_site_name":"| 探花视频","article_published_time":"2025-02-20T16:39:21+00:00","article_modified_time":"2025-10-03T17:47:36+00:00","og_image":[{"width":875,"height":635,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/02\/HumanBlog-875x635-Bots-1.png","type":"image\/png"}],"author":"The 探花视频 Team","twitter_misc":{"Written by":"The 探花视频 Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/"},"author":{"name":"The 探花视频 Team","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083"},"headline":"Protecting Government Benefit Programs from Automated Fraud","datePublished":"2025-02-20T16:39:21+00:00","dateModified":"2025-10-03T17:47:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/"},"wordCount":831,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/02\/HumanBlog-875x635-Bots-1.png","keywords":["Artificial Intelligence","Cybersecurity","Federal Government","HUMAN Security","NightDragon"],"articleSection":["Artificial Intelligence","Cybersecurity","Federal Government"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/","url":"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/","name":"Protecting Government Benefit Programs from Automated Fraud | 探花视频","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/02\/HumanBlog-875x635-Bots-1.png","datePublished":"2025-02-20T16:39:21+00:00","dateModified":"2025-10-03T17:47:36+00:00","description":"We must evolve outdated conceptions of what constitutes cyber threat intelligence (CTI), and endeavor to collect, analyze and report bot intelligence as its own distinct, but highly important category of CTI.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/02\/HumanBlog-875x635-Bots-1.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/02\/HumanBlog-875x635-Bots-1.png","width":875,"height":635,"caption":"HUMAN Security NightDragon Protecting Government Benefit Programs Automated Fraud Cyber Blog Preview Image 2025"},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-night-dragon-protecting-government-benefit-programs-from-automated-fraud-blog-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Protecting Government Benefit Programs from Automated Fraud"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| 探花视频","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"探花视频","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png","width":3184,"height":846,"caption":"探花视频"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083","name":"The 探花视频 Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","caption":"The 探花视频 Team"},"description":"The Digital Media team at 探花视频.","sameAs":["https:\/\/www.carahsoft.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/10289"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=10289"}],"version-history":[{"count":7,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/10289\/revisions"}],"predecessor-version":[{"id":10337,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/10289\/revisions\/10337"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/10300"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=10289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=10289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=10289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}