Critical information you need to truly understand eSkimming Attacks and how to protect your organization

A threat briefing based on the 2025 Source Defense Threat Landscape Report for merchants, risk and compliance, and security teams who need controls that hold up in defense and in the audit.
Many organizations believe they have improved their eSkimming security posture. CSP is tighter. Script inventories are cleaner. Some teams use SRI. Many monitor the payment page.
The catch: attackers have long used techniques to bypass these approaches and have adapted to bypass PCI DSS 4.0.1 requirements.
We will break down what Source Defense saw in the 2025 threat landscape and how modern eSkimming campaigns bypass common defenses like CSP/SRI, payment-page-only focus, iFrame hardening, and even “we outsourced payments.”
You will leave with a clearer way to pressure-test your current approach, identify blind spots across the full customer journey, and strengthen the evidence behind your PCI story.
What you will learn:
Who should attend