News

Subscribe

Contributors

About

4iQ is an identity intelligence company on a mission to empower intel analysts, security researchers, and criminal investigators with capabilities to discover, uncover, and disrupt adversaries. The 4iQ IDLake™ archives more than 14 billion identity records collected from open sources on the deep and dark web from breaches and other open sources. It powers, 4iQ IDHunt, a pioneering identity intelligence and attribution analysis solution used by Fraud Investigation Units, Anti-Money Laundering and Financial Crime Intel Units, and advanced Security Operations Centers. The 4iQ IDLake™ also powers 4iQ IDTheft, used by some of the largest Identity Theft Protection service providers to alert millions of consumers of exposed personal information. 4iQ is headquartered in Los Altos, CA and backed by Forgepoint Capital, C5 Capital, Adara Ventures, and Benhamou Global Ventures.

Contact

Statistics

Posts: 221
Reposts: 0

1 0 8

Black Hat 2017: The Best (and Scariest) Hacks

If you attend the 20th anniversary of Black Hat in Las Vegas recently, what stood out from the hundreds of talks and products on show? A...

Read More…
unknownx500

1 0 0

Small and Medium-sized Business Are Not Learning from Attacks on Large Organizations

Despite the increase of cyber attacks on small to medium sized companies, spend on security does not seems to be a priority. 

Small and medium-sized businesses are not earmarking significant amounts of cash to bolster their cyber-security defenses, despite almost...…

Read More…
unknownx500

1 0 0

North Korean Hackers Prefer Money Over Secrets

Money talks with hackers in North Korea. Hacking organizations are stealing bank account data and selling the information on the dark web.

Cybersecurity experts have noticed a shift in the hacking attacks they suspected were mounted by North Korea. Formerly, most such attacks...…

Read More…
unknownx500

2 0 16

Black Hat 2017 gets underway with a bang

One of the highlights of the annual Black Hat conference in Las Vegas is the steady stream of reports written by security researchers....

Read More…
unknownx500 cj171

2 1 1

The Trouble with IoT...

A critical bug has been found in the open source software library for Internet of Things devices, gSOAP. This software is widely used...

Read More…
unknownx500

1 0 2

The cost of a breach

Breaches have a different impact: security, reputational and economical, in that order.

Firstly the security of the breached company is...

Read More…
unknownx500

1 1 5

Time to discover a data breach

It seems impossible that the 81% of reported intrusions are not detected by internal security process (according to Trustwave report) but...

Read More…
unknownx500

0 0 5

Working together is better

Cybersecurity is very wide so it is not just about malware, exploits nor detecting vulnerabilities we have a lot of areas for governments...

Read More…
unknownx500

As a free user, you can follow Passle and like posts.

To repost this post to your own Passle blog, you will need to upgrade your account.

For plans and pricing, please contact our sales team at sales@passle.net

Sorry, you don't have permission to repost or create posts.

Repost successful!

View the repost

Repost successful!

Your repost is currently a draft. Review your repost and request approval.

Something went wrong whilst reposting - please try again.

Sorry - this is not an option. This post already exists in the Passle you have selected.

Try reposting to another Passle.