From criminals creating fake accounts using stolen or synthetic identities, to exploiting the traditional onboarding process, to capitalizing on data breaches to launch credential stuffing...