4iQ is an identity intelligence company on a mission to empower intel analysts, security researchers, and criminal investigators with capabilities to discover, uncover, and disrupt adversaries. The 4iQ IDLake™ archives more than 14 billion identity records collected from open sources on the deep and dark web from breaches and other open sources. It powers, 4iQ IDHunt, a pioneering identity intelligence and attribution analysis solution used by Fraud Investigation Units, Anti-Money Laundering and Financial Crime Intel Units, and advanced Security Operations Centers. The 4iQ IDLake™ also powers 4iQ IDTheft, used by some of the largest Identity Theft Protection service providers to alert millions of consumers of exposed personal information. 4iQ is headquartered in Los Altos, CA and backed by Forgepoint Capital, C5 Capital, Adara Ventures, and Benhamou Global Ventures.



Posts: 403
Reposts: 0

Small and Medium-sized Business Are Not Learning from Attacks on Large Organizations

Despite the increase of cyber attacks on small to medium sized companies, spend on security does not seems to be a priority. 

Small and medium-sized businesses are not earmarking significant amounts of cash to bolster their cyber-security defenses, despite almost...…

Read More…

North Korean Hackers Prefer Money Over Secrets

Money talks with hackers in North Korea. Hacking organizations are stealing bank account data and selling the information on the dark web.

Cybersecurity experts have noticed a shift in the hacking attacks they suspected were mounted by North Korea. Formerly, most such attacks...…

Read More…

The Trouble with IoT...

A critical bug has been found in the open source software library for Internet of Things devices, gSOAP. This software is widely used...

Read More…

The cost of a breach

Breaches have a different impact: security, reputational and economical, in that order.

Firstly the security of the breached company is...

Read More…

Working together is better

Cybersecurity is very wide so it is not just about malware, exploits nor detecting vulnerabilities we have a lot of areas for governments...

Read More…

As a free user, you can follow Passle and like posts.

To repost this post to your own Passle blog, you will need to upgrade your account.

For plans and pricing, please contact our sales team at

Sorry, you don't have permission to repost or create posts.

Repost successful!

View the repost

Repost successful!

Your repost is currently a draft. Review your repost and request approval.

Something went wrong whilst reposting - please try again.

Sorry - this is not an option. This post already exists in the Passle you have selected.

Try reposting to another Passle.