News

Contributors

About

4IQ powers Cyber Intelligence Centers for defense and law enforcement agencies and provides enterprises with Intelligence Services that monitor open, social, deep and dark web sources to detect stolen credentials and data breaches, investigate adversaries, assess threat levels, conduct due diligence and counter terrorism, hacktivism, organized crime and unfair competition.

Contact

Statistics

Posts: 152
Reposts: 0

1 0 1

Deloitte Breach Affected All Company Email, Admin Accounts

The hacker compromised the firm’s global email server through an “administrator’s account” that, in theory, gave them privileged,...

Read More…

0 0 6

7% of all Amazon S3 data servers are exposed

A little known fact is that many data breaches are as a result of sloppy system administration, and the hackers know this. If the banks...

Read More…
unknownx500

1 2 6

Exclusive: Deloitte cyber-attack may have revealed secret emails

If a company as experience in cyber security such as Deloitte is attacked, what does this mean for the rest of the world? Cybercrime is a...

Read More…
unknownx500

1 0 13

Who was responsible for the OPM breach?

It appears as though the FBI might have discovered the person behind the massive US government Office of Personnel data breach. Although...

Read More…
unknownx500

2 2 18

WIRED | The CCleaner Malware Fiasco Targeted at Least 18 Specific Tech Firms

That target list presents a new wrinkle in the unfolding analysis of the CCleaner attack, one that shifts it from what might have...

Read More…
unknownx500

1 1 3

Mike Rogers Joins 4iQ Board of Directors

We are so honored to have Congressman Mike Rogers on our board. 

Mike Rogers, former Chairman of the US House of Representatives Permanent Select Committee on Intelligence and former FBI Special Agent,...…

Read More…
unknownx500

0 1 16

Equifax data breach - what else is there to know?

So much has already been written about the Equifax breach that this post might seem superfluous. However this report from Bloomberg...

Read More…
unknownx500

2 3 8

Huge stash of stolen passwords dumped - are you at risk?

Since we now accept that a new data breach will occur every day, there is a risk that breaches become normalised and people begin to...

Read More…
unknownx500

2 0 19

A new wave of Open DB hijacks is coming

It was just a matter of time that cybercriminals move from MongoDB to other technologies such as ElasticSearch, MySQL, Cassandra, etc.

Read More…
unknownx500

2 2 6

NIST 800-63 overhauls digital identity services and password recommendations

As data breaches become the cyber criminals' route to easy money, password hygiene is still in the dark ages and yet cyber security...

Read More…

1 0 4

Think Beyond the Security Perimeter: Hackers Already Have your Passwords

Cyber thieves can get in, steal valuable data, and get out without being undetected. 

While hackers have always been interested in hoarding stolen credentials and using them for later attacks, the DBIR team sees this as a...…

Read More…
unknownx500

0 0 7

Fraud: the backbone of Dark Web Cybercrime

New cyber crime tactics require alternative methods to protect yourself.  Are organizations starting to realize the importance of...

Read More…
unknownx500

As a free user, you can follow Passle and like posts.

To repost this post to your own Passle blog, you will need to upgrade your account.

For plans and pricing, please contact our sales team at sales@passle.net

Sorry, you don't have permission to repost or create posts.

Repost successful!

View the repost

Repost successful!

Your repost is currently a draft. Review your repost and request approval.

Something went wrong whilst reposting - please try again.

Sorry - this is not an option. This post already exists in the Passle you have selected.

Try reposting to another Passle.