- December 15, 20204iQ, the leader in identity intelligence, and Alto Analytics, a leader in applying AI & data science to the digital public sphere, today announced the two companies have merged and rebranded as Constella Intelligence (“Constella”), …
- October 20, 2020Identity-focused intelligence company 4iQ on Tuesday announced that it has raised $30 million in a Series C funding round led by ForgePoint Capital and Benhamou Global Ventures. The latest funding round, which brings the total investment secured by …
- October 20, 2020Digital identity protection startup 4iQ today announced a $30 million round it will use to ramp up investments in its go-to-market activities. The funding comes as 4iQ brings former Waterline Data head Kailash Ambwani on as CEO. Over 300 data …
- October 20, 20204iQ is happy to announce $30 million in Series C funding, led by ForgePoint Capital and Benhamou Global Ventures. In addition to this new investment, we have appointed Kailash Ambwani as CEO.…
- October 16, 2020Speed to actionable intelligence is key. In the time period from occurrence to discovery to containment and remediation, cybercriminals are siphoning through the data, trying to figure out how to exploit it. Instead of playing whack-a-mole, identity …
- October 15, 2020Cyberattacks and data breaches cost consumers, companies, and countries billions of dollars annually. October marks National Cybersecurity Awareness Month in the US. Luke Wilson, VP of Intelligence, explains how financial institutions can stop …
- September 14, 2020The C5 Capital Cyber Alliance (of which 4iQ is a proud member) was created to take a collective approach to securing our healthcare systems during the pandemic. As part of LORCALIVE, presented by LORCA Cyber, hear from Lindsay Whyte, our Regional …
- September 1, 2020The COVID-19 pandemic has created a perfect environment for phone scams as more people are connected to their phones when working from home. Scammers constantly shift tactics and messaging to keep up with the times – from tax season to the pandemic. …
- August 11, 202012 Hot Takes on How Red Teaming Takes Pen Testing to the Next Level. Ericka Chickowski of Security Boulevard spoke with a number of security veterans, including Amyn Gilani, to explain the role red teaming plays in a maturing security program and …
- August 9, 2020As the country begins to reopen, we cannot let our guards down – from preventing the spread of this pandemic, or from persistent cybercriminals. In Electronic Health Reporter, Luke Wilson, Vice President of Intelligence at 4iQ, discusses the rise in …
- July 28, 2020It’s no secret that cryptocurrencies have taken the fintech world by storm. Unfortunately, cryptocurrencies like Bitcoin have also drawn attention from some criminals, hackers, and fraudsters. Learn how you can demystify cryptocurrency and speed …
- July 22, 2020Brian Krebs investigation into who was behind the recent mass compromise at Twitter. In 4iQ’s IDHunt platform, he found the jperry94526 email address was used to register accounts at several other sites over the years, including one at the …
- July 7, 2020Various threat actors – from script kiddies to state-sponsored hackers – are taking full advantage of Covid-19 through a myriad of notable scams, including ransomware and phishing campaigns. Unsurprisingly, the combination of people spending more …
- July 7, 2020Even amid the COVID-19 pandemic, cybercrime is a threat that risk professionals need to keep on their risk registers. In this episode, Luke Wilson is joining RIMScast for the second time to discuss the current environment of cyber threats among the …
- July 2, 2020The spread of COVID-19-themed identity-based cyberattacks continue to increase as criminals exploit this ongoing global health emergency. Specifically, these cyberattacks include fake news, Ransomware, phishing campaigns, emails scams and fake …
- June 18, 20204iQ has seen an increase of data packages that include billions of usernames and clear-text passwords circulating in underground communities. As a result, a this breached data is fueling the increase of account takeover, identity theft and other …
- June 16, 20204iQ‘s newest COVID-19 Threat Report reveals COVID-19 cyber attack trends – Sextortion/blackmail emails, fake news, ransomware and phishing campaigns and why it is crucial than ever before to take heightened precautions and be more …
- June 16, 2020The threat intelligence team of 4iQ analyzed data collected on cybercrime campaigns leveraged between January 1 and May 1, to track prominent hacking trends spurred by the COVID-19 pandemic. The report showed misinformation campaigns, COVID-19 hoax …
- June 16, 20204iQ, a leader in Adversary Intelligence, today released its COVID-19 Threat Report, which explores a host of notable scams that have surfaced during these uncertain times, including sextortion/blackmail emails, fake news, ransomware and phishing …
- June 11, 2020Amyn Gilani, VP of Product, discusses the rise of COVID-19 based cyber scams that exploit fear and uncertainty via social engineering. Listen to cxLoyalty Podcast as he talks about how cybercriminals are taking advantage of online behaviour and …
- June 9, 2020A total of 18.7 billion raw identity records circulating in underground communities — a 25.5% increase from the year prior. What does that mean? 4iQ’s VP of Marketing Claire Umeda offers a unique perspective on 2020 Identity Breach Report …
- June 1, 2020There is a fine line between informing the masses and spreading fear. Communicating cyber threats to people and make them aware of the cybercrimes and related issues are important but it even more important to understand why it is occurring at the …
- May 28, 2020Intelligence and National Security Alliance (INSA) selects 4iQ as a 2020 Innovators’ Showcase Honoree with the Intelligence and National Security Foundation (INSF) in partnership with the Office of the Director of National Intelligence.…
- May 25, 2020Listen to Cyber Work Podcast with Amyn Gilani, Vice President of Product at 4iQ as he talks about his path from red teaming to cyber attribution intelligence, where bad guys hide on the internet, and what it’s like to be “on a mission to unmask …
- May 19, 20204iQ Founder & CTO Julio Casal warns about the overlooked source of vulnerability in the supply chain and what steps can your organization take to prevent these attacks. If you can’t honestly say you are fully apprised of the security …
- May 15, 2020To prevent exploitative cybercriminals from causing further damage to our personal privacy and our enterprise security during this vulnerable time, we must understand how these threat actors operate. A good place to start is to examine recent trends …
- May 14, 2020Claire Umeda, Vice President of Marketing at 4iQ spotlights how to improve employees’ cybersecurity awareness with best practices. Working from home full-time is the new normal for millions of Americans. While this certainly prevents the spread of …
- May 12, 20204iQ VP of Intelligence Luke Wilson recently spoke with Cointelegraph to discuss 4iQ’s work, as part of the anti-human trafficking cryptocurrency consortium (ATCC), to help unmask and demystify bad actors in the human trafficking realm. The …
- May 8, 2020Preventing identity-based attacks such as account takeover (ATO) fraud and Business Email Compromise (BEC) begins with securing your personally identifiable information (PII), but this seems to be increasingly difficult as cybercriminals continue to …
- May 7, 20204iQ’s latest report offers a unique perspective on how the underground Breach Economy reflects the severity of targeted public/private sector cyber intrusions and provides exclusive insight into what is reported (and not reported) in the news …
- April 29, 2020Read the interview of Mike Fleck, VP of Identity Protection, at 4iQ on what drew him to cybersecurity and about changing cybersecurity trends, what are the biggest cybersecurity threat today and how will the cyberthreat landscape change over the …
- April 16, 2020In the midst of this public health crisis, cyber-attacks in the healthcare sector increased by 150% during the last two months alone. Looking ahead, there are simple steps that individuals and businesses can take to mitigate cybercrime.…
- April 10, 2020C5 Alliance is a response to a 150% increase in healthcare cyberattacks in the last two months, such as phishing emails pretending to be from the World Health Organization (WHO), and ransomware. The alliance will help ensure hospitals and clinics …
- April 8, 2020Our critical healthcare infrastructure is vulnerable at this time, no doubt, but it truly has been inspiring to see doctors, scientists, and other industry professionals from around the world come together to stop the spread of COVID-19. To fend off …
- March 31, 2020Cybercriminals are exploiting the vulnerable public during this time of crisis by launching massive phishing campaigns. As individuals, we must continue to make smart cyber hygiene decisions to keep ourselves, and our networks, safe.…
- March 30, 2020Small businesses are just as attractive to cyber-attackers as larger enterprises, so cybersecurity should be a top priority for any organization, big or small. Learn what steps small businesses can take right away to address this problem.…
- March 26, 2020Cyber hygiene best practices for organizations to reduce the cybercrime risk and make smarter security decisions amid the chaos.…
- March 26, 2020The importance of knowing your attacker – Is it a sophisticated lock picker on your network or a script kiddie looking for an unlocked door? Equip yourself with identity intelligence for better mitigation and response methods.…
- March 4, 2020A modern approach to crime-fighting with Adversary Intelligence and uncovering the real identity of threat actors.…
- March 2, 20204iQ is proud to have assisted Brian Krebs in his investigation explaining how a large number of French critical infrastructure firms were hacked as part of an extended malware campaign that appears to have been orchestrated by at least one attacker …
- February 21, 2020Cybercriminals are weaponizing some quite rudimentary tools and techniques with criminal persistence at volume to harm individuals and businesses financially and reputationally. Learn how threat actors continue to use publicly available information …
- February 18, 2020The role of data science in security operations centers; reducing manual workloads, helping identify attack patterns and increasing the chances of detecting threats before it’s too late.…
- January 31, 2020The cons of frequent resets and best practices for password management in an era of continuous evolving cyber threats.…
- January 31, 2020The new era battlefield of obfuscated identities and anonymous adversaries that have weaponized data breaches and publicly available information – putting democracy at risk.…
- December 11, 2019Luke Wilson, VP of Intelligence, discussing challenges with cybersecurity, digital privacy, identity theft and keeping kids safe online.…
- November 26, 2019CEO Monica Pal on how data breaches affect companies, consumers, and government, the misaligned expectations of what should happen when they occur, and what can be done to prevent them in the future.…
- November 11, 2019Credentials were used to manage everything from firewalls to administrator accounts. This is another example of the impact of unexpected third-party exposures and how fast they are detected.…
- November 4, 2019Firewalls Don’t Stop Dragons podcast: How are our identities stolen? What happens to our identity information after it’s been stolen? Once we realize we’ve been hacked, what can we do to mitigate the damage and recover from the consequences? …
- October 8, 2019RIMCAST Podcast: The good, bad, and downright scary aspects of virtual currencies and blockchain technology. Luke Wilson explains ways that businesses use blockchain technology, challenges that companies face when implementing blockchain, and how …
- October 8, 2019Security operation leaders need to understand that there is always a real person behind an attack, so shifting to catch the culprit and their cohorts rather than playing the repetitive game of defensive whack-a-mole will be essential moving forward. …
- September 17, 2019Businesses today can’t afford to just be on the defense in fighting cybercrime. There’s always a real person behind an attack, and security operation leaders need to shift their focus to proactively catching the anonymous culprits behind a computer. …
- September 12, 2019How to be proactive defenders? Currently, companies sit connected to the internet as unknowing defenders. Let’s banish this reactionary outlook to the past. In this dangerous environment, we now inhabit, we must stay ahead of digital wrongdoing by …
- August 6, 2019A poorly configured Amazon cloud database resulted in the Capital One breach exposing the information of 106 million U.S. and Canadian customers. What are the five steps that organizations can take to prevent such attacks?…
- August 6, 2019An in-depth look at how stolen card data is exploited on the dark web and beyond.…
- July 31, 2019More than 25% of all malware attacks target the financial services industry – this is more than any other field, and to make matters worse, attacks are continuing to rise. As cybercriminals have more tools at their disposal than ever before, …
- July 18, 2019Is ‘Cyber Vigor’ the Right Path Forward? A muscular undertaking demands a paradigm shift in approach. Mr. de Urioste advocates cyber vigor, a commitment by companies to stay a step ahead of bad actors. This means worse-case scenario planning on the …
- July 12, 2019Over 25% of all malware attacks target banking and financial services, more than any other industry. And according to Monica Pal, CEO of identity intelligence company 4iQ, the number of compromised credit cards, credential leaks, and instances of …
- July 11, 2019The increasing digitization of financial services, via cashless payments with cards (card not present) and mobile apps, has led to greater overall digital capital flow. As more capital circulates on the digital marketplace, companies become …
- July 8, 20194iQ is proud to have assisted in Brian Krebs’ research finding the crooks behind an affiliate program that paid cybercriminals to install the destructive and wildly successful GandCrab ransomware strain announced on May 31, 2019 they were …
- June 25, 2019Earlier this month, Google disclosed that a supply chain attack by one of its vendors resulted in malicious software being pre-installed on millions of new budget Android devices. Google didn’t exactly name those responsible but said it believes the …
- June 24, 2019Here is a list of some of the small business cybersecurity statistics you SHOULD know in one convenient resource and understand why SMBs make such attractive targets and what you can do to protect your business.…
- June 19, 2019Organizations worked to optimize security in preparation for GDPR. However, security optimization has been a continuous effort for most organizations long before this regulation was introduced. Yet we continue to see studies indicating increases in …
- April 9, 2019Ignoring the Darknet is No Longer an Option. The darknet is a treasure trove of cybersecurity data. Applying automation to the collection of meaningful data means we can ‘listen in’ on cybercriminals and their plans.…
- April 3, 2019Data breaches are up 400% in 2018 according to a report by 4iQ, with almost 15 billion records exposed. The top 10 biggest breaches of 2018 were Anti-Public Combo Collections, Aadhaar, India, Marriott Starwood Hotels, Exactis…
- March 26, 2019While cybercrime and data breaches have become increasingly common, there has been a disturbing trend taking place in which cyber criminals have been shifting focus to the “long tail.” Part of the trend has involved increasingly recirculating bigger …
- March 20, 2019Small to medium sized organisations were the prime target of cyber criminals in 2018 according to a recent report by cyber security firm 4iQ. The report highlights that cyber criminals are correct to target SMEs as 32% have failed to take any action …
- March 15, 2019An interesting study by identity intelligence company 4iQ attempts to shed some light in this area. According to the study, there were 12,499 new breaches in 2018, an increase of more than 400 percent from the preceding year. A total of 14.9 billion …
- March 14, 2019Exploring the implications of adversaries or competitors using compromised networks to gain a business advantage under the guise of a data breach. At 4iQ, we’ve continued to observe the flourishing trade of PII in underground communities and the …
- March 14, 2019According to a new report from 4IQ, there were 12,449 confirmed data breaches in 2018, a 424% increase when compared with 2017. Also, 47% of all compromised identity records were exposed in breaches from the United States and China.…
- March 12, 2019According to 4iQ, large organizations continued to focus on improving their security posture in 2018. On the flip side, however, small businesses and suppliers to those companies present “weak links in the value chain”.…
- March 12, 2019Small and midsize businesses can’t afford to take the same measures, as they have little to no security budgets and lack skills they need to defend against cybercrime. Large companies have historically been prime breach targets, but hackers …
- March 8, 20194iQ’s annual report confirmed 12,440 new breaches, a 424 percent increase compared to 2017, and of the 14.9 billion records compromised, 3.6 billion were confirmed real and exposed for the first time and were not part of an earlier breach. …
- March 8, 2019Cyber-criminals are also getting smarter about how they organize, aggregate and package data sets. Stolen personally identifiable information (PII) is combined with publicly available data to enable more successful account takeover, identity theft, …
- March 7, 2019While mega data breaches gain the most attention, the long tail of smaller breaches is largely ignored. Monica Pal of 4iQ shares findings on recent breach trends. In a video interview with Information Security Media Group at RSA Conference 2019 in …
- March 6, 20194iQ’s analysis showed that forums and referral websites were most vulnerable, accounting for more than 3,400, or 27.5% of the hacks detected by the company. Gaming and gambling websites and ecommerce platforms were also particularly vulnerable, with …
- March 6, 2019The number of confirmed data breaches during 2018 reached 12,449, a 424% increase when compared with 2017, 47% of all compromised identity records having been exposed in breaches experienced by organizations from the United States and China.…
- February 6, 2019Done right, companies that suffer a data breach generally take an approach that’s proactive, honest and transparent. After learning that a company has suffered a breach, the common advice is to swiftly investigate the situation, identify and mend …
- February 1, 2019Attacking cybercrime from multiple angles, while not new, is also important and something that must continue. “I think it’s important to collaborate. To send out a joint message that there will be consequences and perhaps make them [cybercriminals] …
- January 31, 2019Phishing attempts have spiked in recent years, and with the IRS unable to offer as much protection due to the shutdown, taxpayers are especially vulnerable. According to the IRS, over the last year, there was a 60 per cent increase in illegal email …
- January 30, 2019Like the Cold War, the Code War is not what we think of as war; it is a complicated, multidimensional, international period of tension that requires resources across government and the private sector. It is being fought online in an environment of …
- January 24, 2019Putting political divisions and affiliations aside, the government partially shutting down for the third time over the last year is extremely worrisome, particularly when considering its impact on the nation’s cybersecurity priorities. Unlike the …
- December 15, 20204iQ, the leader in identity intelligence, and Alto Analytics, a leader in applying AI & data science to the digital public sphere, today announced the two companies have merged and rebranded as Constella Intelligence (“Constella”), …
- October 20, 2020Identity-focused intelligence company 4iQ on Tuesday announced that it has raised $30 million in a Series C funding round led by ForgePoint Capital and Benhamou Global Ventures. The latest funding round, which brings the total investment secured by …
- October 20, 2020Digital identity protection startup 4iQ today announced a $30 million round it will use to ramp up investments in its go-to-market activities. The funding comes as 4iQ brings former Waterline Data head Kailash Ambwani on as CEO. Over 300 data …
- October 20, 20204iQ is happy to announce $30 million in Series C funding, led by ForgePoint Capital and Benhamou Global Ventures. In addition to this new investment, we have appointed Kailash Ambwani as CEO.…
- October 16, 2020Speed to actionable intelligence is key. In the time period from occurrence to discovery to containment and remediation, cybercriminals are siphoning through the data, trying to figure out how to exploit it. Instead of playing whack-a-mole, identity …
- October 15, 2020Cyberattacks and data breaches cost consumers, companies, and countries billions of dollars annually. October marks National Cybersecurity Awareness Month in the US. Luke Wilson, VP of Intelligence, explains how financial institutions can stop …
- September 14, 2020The C5 Capital Cyber Alliance (of which 4iQ is a proud member) was created to take a collective approach to securing our healthcare systems during the pandemic. As part of LORCALIVE, presented by LORCA Cyber, hear from Lindsay Whyte, our Regional …
- September 1, 2020The COVID-19 pandemic has created a perfect environment for phone scams as more people are connected to their phones when working from home. Scammers constantly shift tactics and messaging to keep up with the times – from tax season to the pandemic. …
- August 11, 202012 Hot Takes on How Red Teaming Takes Pen Testing to the Next Level. Ericka Chickowski of Security Boulevard spoke with a number of security veterans, including Amyn Gilani, to explain the role red teaming plays in a maturing security program and …
- August 9, 2020As the country begins to reopen, we cannot let our guards down – from preventing the spread of this pandemic, or from persistent cybercriminals. In Electronic Health Reporter, Luke Wilson, Vice President of Intelligence at 4iQ, discusses the rise in …
- July 28, 2020It’s no secret that cryptocurrencies have taken the fintech world by storm. Unfortunately, cryptocurrencies like Bitcoin have also drawn attention from some criminals, hackers, and fraudsters. Learn how you can demystify cryptocurrency and speed …
- July 22, 2020Brian Krebs investigation into who was behind the recent mass compromise at Twitter. In 4iQ’s IDHunt platform, he found the jperry94526 email address was used to register accounts at several other sites over the years, including one at the …
- July 7, 2020Various threat actors – from script kiddies to state-sponsored hackers – are taking full advantage of Covid-19 through a myriad of notable scams, including ransomware and phishing campaigns. Unsurprisingly, the combination of people spending more …
- July 7, 2020Even amid the COVID-19 pandemic, cybercrime is a threat that risk professionals need to keep on their risk registers. In this episode, Luke Wilson is joining RIMScast for the second time to discuss the current environment of cyber threats among the …
- July 2, 2020The spread of COVID-19-themed identity-based cyberattacks continue to increase as criminals exploit this ongoing global health emergency. Specifically, these cyberattacks include fake news, Ransomware, phishing campaigns, emails scams and fake …
- June 18, 20204iQ has seen an increase of data packages that include billions of usernames and clear-text passwords circulating in underground communities. As a result, a this breached data is fueling the increase of account takeover, identity theft and other …
- June 16, 20204iQ‘s newest COVID-19 Threat Report reveals COVID-19 cyber attack trends – Sextortion/blackmail emails, fake news, ransomware and phishing campaigns and why it is crucial than ever before to take heightened precautions and be more …
- June 16, 2020The threat intelligence team of 4iQ analyzed data collected on cybercrime campaigns leveraged between January 1 and May 1, to track prominent hacking trends spurred by the COVID-19 pandemic. The report showed misinformation campaigns, COVID-19 hoax …
- June 16, 20204iQ, a leader in Adversary Intelligence, today released its COVID-19 Threat Report, which explores a host of notable scams that have surfaced during these uncertain times, including sextortion/blackmail emails, fake news, ransomware and phishing …
- June 11, 2020Amyn Gilani, VP of Product, discusses the rise of COVID-19 based cyber scams that exploit fear and uncertainty via social engineering. Listen to cxLoyalty Podcast as he talks about how cybercriminals are taking advantage of online behaviour and …
- June 9, 2020A total of 18.7 billion raw identity records circulating in underground communities — a 25.5% increase from the year prior. What does that mean? 4iQ’s VP of Marketing Claire Umeda offers a unique perspective on 2020 Identity Breach Report …
- June 1, 2020There is a fine line between informing the masses and spreading fear. Communicating cyber threats to people and make them aware of the cybercrimes and related issues are important but it even more important to understand why it is occurring at the …
- May 28, 2020Intelligence and National Security Alliance (INSA) selects 4iQ as a 2020 Innovators’ Showcase Honoree with the Intelligence and National Security Foundation (INSF) in partnership with the Office of the Director of National Intelligence.…
- May 25, 2020Listen to Cyber Work Podcast with Amyn Gilani, Vice President of Product at 4iQ as he talks about his path from red teaming to cyber attribution intelligence, where bad guys hide on the internet, and what it’s like to be “on a mission to unmask …
- May 19, 20204iQ Founder & CTO Julio Casal warns about the overlooked source of vulnerability in the supply chain and what steps can your organization take to prevent these attacks. If you can’t honestly say you are fully apprised of the security …
- May 15, 2020To prevent exploitative cybercriminals from causing further damage to our personal privacy and our enterprise security during this vulnerable time, we must understand how these threat actors operate. A good place to start is to examine recent trends …
- May 14, 2020Claire Umeda, Vice President of Marketing at 4iQ spotlights how to improve employees’ cybersecurity awareness with best practices. Working from home full-time is the new normal for millions of Americans. While this certainly prevents the spread of …
- May 12, 20204iQ VP of Intelligence Luke Wilson recently spoke with Cointelegraph to discuss 4iQ’s work, as part of the anti-human trafficking cryptocurrency consortium (ATCC), to help unmask and demystify bad actors in the human trafficking realm. The …
- May 8, 2020Preventing identity-based attacks such as account takeover (ATO) fraud and Business Email Compromise (BEC) begins with securing your personally identifiable information (PII), but this seems to be increasingly difficult as cybercriminals continue to …
- May 7, 20204iQ’s latest report offers a unique perspective on how the underground Breach Economy reflects the severity of targeted public/private sector cyber intrusions and provides exclusive insight into what is reported (and not reported) in the news …
- April 29, 2020Read the interview of Mike Fleck, VP of Identity Protection, at 4iQ on what drew him to cybersecurity and about changing cybersecurity trends, what are the biggest cybersecurity threat today and how will the cyberthreat landscape change over the …
- April 16, 2020In the midst of this public health crisis, cyber-attacks in the healthcare sector increased by 150% during the last two months alone. Looking ahead, there are simple steps that individuals and businesses can take to mitigate cybercrime.…
- April 10, 2020C5 Alliance is a response to a 150% increase in healthcare cyberattacks in the last two months, such as phishing emails pretending to be from the World Health Organization (WHO), and ransomware. The alliance will help ensure hospitals and clinics …
- April 8, 2020Our critical healthcare infrastructure is vulnerable at this time, no doubt, but it truly has been inspiring to see doctors, scientists, and other industry professionals from around the world come together to stop the spread of COVID-19. To fend off …
- March 31, 2020Cybercriminals are exploiting the vulnerable public during this time of crisis by launching massive phishing campaigns. As individuals, we must continue to make smart cyber hygiene decisions to keep ourselves, and our networks, safe.…
- March 30, 2020Small businesses are just as attractive to cyber-attackers as larger enterprises, so cybersecurity should be a top priority for any organization, big or small. Learn what steps small businesses can take right away to address this problem.…
- March 26, 2020Cyber hygiene best practices for organizations to reduce the cybercrime risk and make smarter security decisions amid the chaos.…
- March 26, 2020The importance of knowing your attacker – Is it a sophisticated lock picker on your network or a script kiddie looking for an unlocked door? Equip yourself with identity intelligence for better mitigation and response methods.…
- March 4, 2020A modern approach to crime-fighting with Adversary Intelligence and uncovering the real identity of threat actors.…
- March 2, 20204iQ is proud to have assisted Brian Krebs in his investigation explaining how a large number of French critical infrastructure firms were hacked as part of an extended malware campaign that appears to have been orchestrated by at least one attacker …
- February 21, 2020Cybercriminals are weaponizing some quite rudimentary tools and techniques with criminal persistence at volume to harm individuals and businesses financially and reputationally. Learn how threat actors continue to use publicly available information …
- February 18, 2020The role of data science in security operations centers; reducing manual workloads, helping identify attack patterns and increasing the chances of detecting threats before it’s too late.…
- January 31, 2020The cons of frequent resets and best practices for password management in an era of continuous evolving cyber threats.…
- January 31, 2020The new era battlefield of obfuscated identities and anonymous adversaries that have weaponized data breaches and publicly available information – putting democracy at risk.…
- December 11, 2019Luke Wilson, VP of Intelligence, discussing challenges with cybersecurity, digital privacy, identity theft and keeping kids safe online.…
- November 26, 2019CEO Monica Pal on how data breaches affect companies, consumers, and government, the misaligned expectations of what should happen when they occur, and what can be done to prevent them in the future.…
- November 11, 2019Credentials were used to manage everything from firewalls to administrator accounts. This is another example of the impact of unexpected third-party exposures and how fast they are detected.…
- November 4, 2019Firewalls Don’t Stop Dragons podcast: How are our identities stolen? What happens to our identity information after it’s been stolen? Once we realize we’ve been hacked, what can we do to mitigate the damage and recover from the consequences? …
- October 8, 2019RIMCAST Podcast: The good, bad, and downright scary aspects of virtual currencies and blockchain technology. Luke Wilson explains ways that businesses use blockchain technology, challenges that companies face when implementing blockchain, and how …
- October 8, 2019Security operation leaders need to understand that there is always a real person behind an attack, so shifting to catch the culprit and their cohorts rather than playing the repetitive game of defensive whack-a-mole will be essential moving forward. …
- September 17, 2019Businesses today can’t afford to just be on the defense in fighting cybercrime. There’s always a real person behind an attack, and security operation leaders need to shift their focus to proactively catching the anonymous culprits behind a computer. …
- September 12, 2019How to be proactive defenders? Currently, companies sit connected to the internet as unknowing defenders. Let’s banish this reactionary outlook to the past. In this dangerous environment, we now inhabit, we must stay ahead of digital wrongdoing by …
- August 6, 2019A poorly configured Amazon cloud database resulted in the Capital One breach exposing the information of 106 million U.S. and Canadian customers. What are the five steps that organizations can take to prevent such attacks?…
- August 6, 2019An in-depth look at how stolen card data is exploited on the dark web and beyond.…
- July 31, 2019More than 25% of all malware attacks target the financial services industry – this is more than any other field, and to make matters worse, attacks are continuing to rise. As cybercriminals have more tools at their disposal than ever before, …
- July 18, 2019Is ‘Cyber Vigor’ the Right Path Forward? A muscular undertaking demands a paradigm shift in approach. Mr. de Urioste advocates cyber vigor, a commitment by companies to stay a step ahead of bad actors. This means worse-case scenario planning on the …
- July 12, 2019Over 25% of all malware attacks target banking and financial services, more than any other industry. And according to Monica Pal, CEO of identity intelligence company 4iQ, the number of compromised credit cards, credential leaks, and instances of …
- July 11, 2019The increasing digitization of financial services, via cashless payments with cards (card not present) and mobile apps, has led to greater overall digital capital flow. As more capital circulates on the digital marketplace, companies become …
- July 8, 20194iQ is proud to have assisted in Brian Krebs’ research finding the crooks behind an affiliate program that paid cybercriminals to install the destructive and wildly successful GandCrab ransomware strain announced on May 31, 2019 they were …
- June 25, 2019Earlier this month, Google disclosed that a supply chain attack by one of its vendors resulted in malicious software being pre-installed on millions of new budget Android devices. Google didn’t exactly name those responsible but said it believes the …
- June 24, 2019Here is a list of some of the small business cybersecurity statistics you SHOULD know in one convenient resource and understand why SMBs make such attractive targets and what you can do to protect your business.…
- June 19, 2019Organizations worked to optimize security in preparation for GDPR. However, security optimization has been a continuous effort for most organizations long before this regulation was introduced. Yet we continue to see studies indicating increases in …
- April 9, 2019Ignoring the Darknet is No Longer an Option. The darknet is a treasure trove of cybersecurity data. Applying automation to the collection of meaningful data means we can ‘listen in’ on cybercriminals and their plans.…
- April 3, 2019Data breaches are up 400% in 2018 according to a report by 4iQ, with almost 15 billion records exposed. The top 10 biggest breaches of 2018 were Anti-Public Combo Collections, Aadhaar, India, Marriott Starwood Hotels, Exactis…
- March 26, 2019While cybercrime and data breaches have become increasingly common, there has been a disturbing trend taking place in which cyber criminals have been shifting focus to the “long tail.” Part of the trend has involved increasingly recirculating bigger …
- March 20, 2019Small to medium sized organisations were the prime target of cyber criminals in 2018 according to a recent report by cyber security firm 4iQ. The report highlights that cyber criminals are correct to target SMEs as 32% have failed to take any action …
- March 15, 2019An interesting study by identity intelligence company 4iQ attempts to shed some light in this area. According to the study, there were 12,499 new breaches in 2018, an increase of more than 400 percent from the preceding year. A total of 14.9 billion …
- March 14, 2019Exploring the implications of adversaries or competitors using compromised networks to gain a business advantage under the guise of a data breach. At 4iQ, we’ve continued to observe the flourishing trade of PII in underground communities and the …
- March 14, 2019According to a new report from 4IQ, there were 12,449 confirmed data breaches in 2018, a 424% increase when compared with 2017. Also, 47% of all compromised identity records were exposed in breaches from the United States and China.…
- March 12, 2019According to 4iQ, large organizations continued to focus on improving their security posture in 2018. On the flip side, however, small businesses and suppliers to those companies present “weak links in the value chain”.…
- March 12, 2019Small and midsize businesses can’t afford to take the same measures, as they have little to no security budgets and lack skills they need to defend against cybercrime. Large companies have historically been prime breach targets, but hackers …
- March 8, 20194iQ’s annual report confirmed 12,440 new breaches, a 424 percent increase compared to 2017, and of the 14.9 billion records compromised, 3.6 billion were confirmed real and exposed for the first time and were not part of an earlier breach. …
- March 8, 2019Cyber-criminals are also getting smarter about how they organize, aggregate and package data sets. Stolen personally identifiable information (PII) is combined with publicly available data to enable more successful account takeover, identity theft, …
- March 7, 2019While mega data breaches gain the most attention, the long tail of smaller breaches is largely ignored. Monica Pal of 4iQ shares findings on recent breach trends. In a video interview with Information Security Media Group at RSA Conference 2019 in …
- March 6, 20194iQ’s analysis showed that forums and referral websites were most vulnerable, accounting for more than 3,400, or 27.5% of the hacks detected by the company. Gaming and gambling websites and ecommerce platforms were also particularly vulnerable, with …
- March 6, 2019The number of confirmed data breaches during 2018 reached 12,449, a 424% increase when compared with 2017, 47% of all compromised identity records having been exposed in breaches experienced by organizations from the United States and China.…
- February 6, 2019Done right, companies that suffer a data breach generally take an approach that’s proactive, honest and transparent. After learning that a company has suffered a breach, the common advice is to swiftly investigate the situation, identify and mend …
- February 1, 2019Attacking cybercrime from multiple angles, while not new, is also important and something that must continue. “I think it’s important to collaborate. To send out a joint message that there will be consequences and perhaps make them [cybercriminals] …
- January 31, 2019Phishing attempts have spiked in recent years, and with the IRS unable to offer as much protection due to the shutdown, taxpayers are especially vulnerable. According to the IRS, over the last year, there was a 60 per cent increase in illegal email …
- January 30, 2019Like the Cold War, the Code War is not what we think of as war; it is a complicated, multidimensional, international period of tension that requires resources across government and the private sector. It is being fought online in an environment of …
- January 24, 2019Putting political divisions and affiliations aside, the government partially shutting down for the third time over the last year is extremely worrisome, particularly when considering its impact on the nation’s cybersecurity priorities. Unlike the …