{"@context":"https:\/\/schema.org\/","@type":"CollectionPage","@id":"https:\/\/wiki.fraudlogix.com\/blog\/category\/featured-posts\/#CollectionPage","headline":"Featured Posts Category","description":"<p>To appear on homepage<\/p>\n","url":"https:\/\/wiki.fraudlogix.com\/blog\/category\/featured-posts\/","hasPart":[{"@type":"Article","@id":"https:\/\/wiki.fraudlogix.com\/blog\/rsoc-raf-strikes","headline":"RSOC &#038; RAF Strikes | Protect AdSense Features from Invalid Traffic","url":"https:\/\/wiki.fraudlogix.com\/blog\/rsoc-raf-strikes","datePublished":"2025-08-12","dateModified":"2025-08-13","mainEntityOfPage":"https:\/\/wiki.fraudlogix.com\/blog\/rsoc-raf-strikes","author":{"@type":"Person","@id":"https:\/\/wiki.fraudlogix.com\/blog\/author\/priscilla\/#Person","name":"Fraudlogix","url":"https:\/\/wiki.fraudlogix.com\/blog\/author\/priscilla\/","identifier":6,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/06995c16354b313a238da61945d79b55?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/06995c16354b313a238da61945d79b55?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Fraudlogix","logo":{"@type":"ImageObject","@id":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","url":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/wiki.fraudlogix.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-12-2025-04_59_30-PM.png","url":"https:\/\/wiki.fraudlogix.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-Aug-12-2025-04_59_30-PM.png","height":1024,"width":1536},"keywords":null},{"@type":"Article","@id":"https:\/\/wiki.fraudlogix.com\/blog\/zapier-security-fraudlogix-templates","headline":"Zapier Security: 12 Fraudlogix Templates to Protect Your Workflows","url":"https:\/\/wiki.fraudlogix.com\/blog\/zapier-security-fraudlogix-templates","datePublished":"2025-08-12","dateModified":"2025-08-14","mainEntityOfPage":"https:\/\/wiki.fraudlogix.com\/blog\/zapier-security-fraudlogix-templates","author":{"@type":"Person","@id":"https:\/\/wiki.fraudlogix.com\/blog\/author\/priscilla\/#Person","name":"Fraudlogix","url":"https:\/\/wiki.fraudlogix.com\/blog\/author\/priscilla\/","identifier":6,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/06995c16354b313a238da61945d79b55?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/06995c16354b313a238da61945d79b55?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Fraudlogix","logo":{"@type":"ImageObject","@id":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","url":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/wiki.fraudlogix.com\/wp-content\/uploads\/2025\/08\/Untitled-design-1-1.png","url":"https:\/\/wiki.fraudlogix.com\/wp-content\/uploads\/2025\/08\/Untitled-design-1-1.png","height":1024,"width":1536},"keywords":null},{"@type":"Article","@id":"https:\/\/wiki.fraudlogix.com\/blog\/15-years-fraud-detection","headline":"15 Years of Fighting Fraud: How Fraudlogix Evolved","url":"https:\/\/wiki.fraudlogix.com\/blog\/15-years-fraud-detection","datePublished":"2025-07-10","dateModified":"2025-07-18","mainEntityOfPage":"https:\/\/wiki.fraudlogix.com\/blog\/15-years-fraud-detection","author":{"@type":"Person","@id":"https:\/\/wiki.fraudlogix.com\/blog\/author\/priscilla\/#Person","name":"Fraudlogix","url":"https:\/\/wiki.fraudlogix.com\/blog\/author\/priscilla\/","identifier":6,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/06995c16354b313a238da61945d79b55?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/06995c16354b313a238da61945d79b55?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Fraudlogix","logo":{"@type":"ImageObject","@id":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","url":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.fraudlogix.com\/wp-content\/uploads\/2025\/07\/Jess-Head-Shot-New-150x150.jpg","url":"https:\/\/www.fraudlogix.com\/wp-content\/uploads\/2025\/07\/Jess-Head-Shot-New-150x150.jpg","height":"150","width":"150"},"keywords":null},{"@type":"Article","@id":"https:\/\/wiki.fraudlogix.com\/affiliate-blog\/how-to-safeguard-your-affiliate-campaigns-and-weed-out-ip-addresses-associated-with-ad-fraud\/","headline":"Safeguard Your Affiliate Campaigns to Prevent Fraudulent IP Addresses","url":"https:\/\/wiki.fraudlogix.com\/affiliate-blog\/how-to-safeguard-your-affiliate-campaigns-and-weed-out-ip-addresses-associated-with-ad-fraud\/","datePublished":"2020-02-18","dateModified":"2025-01-10","mainEntityOfPage":"https:\/\/wiki.fraudlogix.com\/affiliate-blog\/how-to-safeguard-your-affiliate-campaigns-and-weed-out-ip-addresses-associated-with-ad-fraud\/","author":{"@type":"Person","@id":"https:\/\/wiki.fraudlogix.com\/blog\/author\/user\/#Person","name":"user","url":"https:\/\/wiki.fraudlogix.com\/blog\/author\/user\/","identifier":1,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/8245dd29ff15688019d08901d0fdcd0d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8245dd29ff15688019d08901d0fdcd0d?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Fraudlogix","logo":{"@type":"ImageObject","@id":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","url":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/wiki.fraudlogix.com\/wp-content\/uploads\/2020\/02\/cyber-security-3194286_1920.jpg","url":"https:\/\/wiki.fraudlogix.com\/wp-content\/uploads\/2020\/02\/cyber-security-3194286_1920.jpg","height":1151,"width":1920},"keywords":null}]}