Featured
  • The cyber-threat landscape amid Covid-19
    The cyber-threat landscape amid Covid-19
    As long as COVID-19 precautions remain in place and pervade almost every aspect of our lives, we must continue to increase our cybersecurity safeguards and remain on high alert for suspicious activity.…
  • Cybercriminals Turn to Fake News, COVID-19 Hoax Websites & Email Scams
    Cybercriminals Turn to Fake News, COVID-19 Hoax Websites & Email Scams
    Remote work is here to stay. Claire Umeda, Vice President of Marketing at 4iQ, spotlights how to improve employees’ cybersecurity awareness with best practices. With simple steps, individuals can enhance their home’s security posture and in turn, …
  • Previously Exposed Credentials Recirculate Underground
    Previously Exposed Credentials Recirculate Underground
    What can consumers do if their data is already out there circulating? Big combo packages surface, billions of email addresses or usernames associated with clear-text passwords recirculate in underground communities, making the data increasingly …
  • Uptick in Nation State Misinformation Campaigns and Cyberattacks on Healthcare Sector
    Uptick in Nation State Misinformation Campaigns and Cyberattacks on Healthcare Sector
    4iQ‘s newest COVID-19 Threat Report reveals COVID-19 cyber attack trends – Sextortion/blackmail emails, fake news, ransomware and phishing campaigns and why it is crucial than ever before to take heightened precautions and be more …
  • Cloud Mitigation for Ransomware, as COVID-19 Spurs Cyberattacks
    Cloud Mitigation for Ransomware, as COVID-19 Spurs Cyberattacks
    The threat intelligence team of 4iQ analyzed data collected on cybercrime campaigns leveraged between January 1 and May 1, to track prominent hacking trends spurred by the COVID-19 pandemic. The report showed misinformation campaigns, COVID-19 hoax …
  • New 4iQ Report Shows Uptick in Nation State Misinformation Campaigns, Cyber Attacks on Healthcare Sector Amid COVID-19
    New 4iQ Report Shows Uptick in Nation State Misinformation Campaigns, Cyber Attacks on Healthcare Sector Amid COVID-19
    4iQ, a leader in Adversary Intelligence, today released its COVID-19 Threat Report, which explores a host of notable scams that have surfaced during these uncertain times, including sextortion/blackmail emails, fake news, ransomware and phishing …
  • Protecting against emerging cyber threats during COVID and beyond Podcast
    Protecting against emerging cyber threats during COVID and beyond Podcast
    Amyn Gilani, VP of Product, discusses the rise of COVID-19 based cyber scams that exploit fear and uncertainty via social engineering. Listen to cxLoyalty Podcast as he talks about how cybercriminals are taking advantage of online behaviour and …
  • The Weaponization of Our Digital Identities
    The Weaponization of Our Digital Identities
    A total of 18.7 billion raw identity records circulating in underground communities — a 25.5% increase from the year prior. What does that mean? 4iQ’s VP of Marketing Claire Umeda offers a unique perspective on 2020 Identity Breach Report …
  • Cyber Threats Don’t Require Sensationalism
    Cyber Threats Don’t Require Sensationalism
    There is a fine line between informing the masses and spreading fear. Communicating cyber threats to people and make them aware of the cybercrimes and related issues are important but it even more important to understand why it is occurring at the …
  • 020
    2020 Innovators’ Showcase Honorees
    Intelligence and National Security Alliance (INSA) selects 4iQ as a 2020 Innovators’ Showcase Honoree with the Intelligence and National Security Foundation (INSF) in partnership with the Office of the Director of National Intelligence.…
  • Hunting criminals and stolen identities across the internet
    Hunting criminals and stolen identities across the internet
    Listen to Cyber Work Podcast with Amyn Gilani, Vice President of Product at 4iQ as he talks about his path from red teaming to cyber attribution intelligence, where bad guys hide on the internet, and what it’s like to be “on a mission to unmask …
  • What’s Lurking in Your Supply Chain?
    What’s Lurking in Your Supply Chain?
    4iQ Founder & CTO Julio Casal warns about the overlooked source of vulnerability in the supply chain and what steps can your organization take to prevent these attacks. If you can’t honestly say you are fully apprised of the security …
  • Identity-Based Cyber Attacks Continue to Rise
    Identity-Based Cyber Attacks Continue to Rise
    To prevent exploitative cybercriminals from causing further damage to our personal privacy and our enterprise security during this vulnerable time, we must understand how these threat actors operate. A good place to start is to examine recent trends …
  • Best Practices to Fight Phishing & Strengthen Cybersecurity in COVID-19 Era
    Best Practices to Fight Phishing & Strengthen Cybersecurity in COVID-19 Era
    Claire Umeda, Vice President of Marketing at 4iQ spotlights how to improve employees’ cybersecurity awareness with best practices. Working from home full-time is the new normal for millions of Americans. While this certainly prevents the spread of …
  • Crypto Companies, Law Enforcement and Intelligence Firms Team Up to Fight Human Trafficking
    Crypto Companies, Law Enforcement and Intelligence Firms Team Up to Fight Human Trafficking
    4iQ VP of Intelligence Luke Wilson recently spoke with Cointelegraph to discuss 4iQ’s work, as part of the anti-human trafficking cryptocurrency consortium (ATCC), to help unmask and demystify bad actors in the human trafficking realm. The …
  • Identity-Based Attacks Proliferate as Exposed Credentials Become More Intimate
    Identity-Based Attacks Proliferate as Exposed Credentials Become More Intimate
    Preventing identity-based attacks such as account takeover (ATO) fraud and Business Email Compromise (BEC) begins with securing your personally identifiable information (PII), but this seems to be increasingly difficult as cybercriminals continue to …
  • iQ
    4iQ Report: The Era of Weaponized Data Breaches
    4iQ’s latest report offers a unique perspective on how the underground Breach Economy reflects the severity of targeted public/private sector cyber intrusions and provides exclusive insight into what is reported (and not reported) in the news …
  • Interview with Mike Fleck – How cybersecurity will change over the next few years.
    Interview with Mike Fleck – How cybersecurity will change over the next few years.
    Read the interview of Mike Fleck, VP of Identity Protection, at 4iQ on what drew him to cybersecurity and about changing cybersecurity trends, what are the biggest cybersecurity threat today and how will the cyberthreat landscape change over the …
  • Cybercriminals Continue to Prey on Coronavirus Fear
    Cybercriminals Continue to Prey on Coronavirus Fear
    In the midst of this public health crisis, cyber-attacks in the healthcare sector increased by 150% during the last two months alone. Looking ahead, there are simple steps that individuals and businesses can take to mitigate cybercrime.…
  • International Cybersecurity Experts Come Together to Fight COVID-19 Related Cyberthreats
    International Cybersecurity Experts Come Together to Fight COVID-19 Related Cyberthreats
    C5 Alliance is a response to a 150% increase in healthcare cyberattacks in the last two months, such as phishing emails pretending to be from the World Health Organization (WHO), and ransomware. The alliance will help ensure hospitals and clinics …
  • COVID-19: Best Practices to Safeguard Organizations from Cybercriminals
    COVID-19: Best Practices to Safeguard Organizations from Cybercriminals
    Our critical healthcare infrastructure is vulnerable at this time, no doubt, but it truly has been inspiring to see doctors, scientists, and other industry professionals from around the world come together to stop the spread of COVID-19. To fend off …
  • For Coronavirus, Take Care of Personal and Cyber Hygiene
    For Coronavirus, Take Care of Personal and Cyber Hygiene
    Cybercriminals are exploiting the vulnerable public during this time of crisis by launching massive phishing campaigns.  As individuals, we must continue to make smart cyber hygiene decisions to keep ourselves, and our networks, safe.…
  • Small Businesses Beware: Why the Adversary Values Your Data
    Small Businesses Beware: Why the Adversary Values Your Data
    Small businesses are just as attractive to cyber-attackers as larger enterprises, so cybersecurity should be a top priority for any organization, big or small. Learn what steps small businesses can take right away to address this problem.…
  • Cybercriminals are Exploiting Coronavirus Fears
    Cybercriminals are Exploiting Coronavirus Fears
    Cyber hygiene best practices for organizations to reduce the cybercrime risk and make smarter security decisions amid the chaos.…
  • Why hackers are more persistent than security teams
    Why hackers are more persistent than security teams
    The importance of knowing your attacker –  Is it a sophisticated lock picker on your network or a script kiddie looking for an unlocked door? Equip yourself with identity intelligence for better mitigation and response methods.…
  • Uncover the Real Identities Behind Criminal Activities
    Uncover the Real Identities Behind Criminal Activities
    A modern approach to crime-fighting with Adversary Intelligence and uncovering the real identity of threat actors.…
  • French Firms Rocked by Kasbah Hacker?
    French Firms Rocked by Kasbah Hacker?
    4iQ is proud to have assisted Brian Krebs in his investigation explaining how a large number of French critical infrastructure firms were hacked as part of an extended malware campaign that appears to have been orchestrated by at least one attacker …
  • Publicly available information puts democracy at risk
    Publicly available information puts democracy at risk
    Cybercriminals are weaponizing some quite rudimentary tools and techniques with criminal persistence at volume to harm individuals and businesses financially and reputationally. Learn how threat actors continue to use publicly available information …
  • How data science tools can lighten the load for cybersecurity teams
    How data science tools can lighten the load for cybersecurity teams
    The role of data science in security operations centers; reducing manual workloads, helping identify attack patterns and increasing the chances of detecting threats before it’s too late.…
  • Are Periodic Password Resets Necessary?
    Are Periodic Password Resets Necessary?
    The cons of frequent resets and best practices for password management in an era of continuous evolving cyber threats.…
  • Weaponized Data Breaches: Fueling a Global Cyber Cold War
    Weaponized Data Breaches: Fueling a Global Cyber Cold War
    The new era battlefield of obfuscated identities and anonymous adversaries that have weaponized data breaches and publicly available information – putting democracy at risk.…
  • How to Avoid Identity Theft: Interview with Luke Wilson, 4iQ
    How to Avoid Identity Theft: Interview with Luke Wilson, 4iQ
    Luke Wilson, VP of Intelligence, discussing challenges with cybersecurity, digital privacy, identity theft and keeping kids safe online.…
  • Addressing Data Breaches: How to Stop Them
    Addressing Data Breaches: How to Stop Them
    CEO Monica Pal on how data breaches affect companies, consumers, and government, the misaligned expectations of what should happen when they occur, and what can be done to prevent them in the future.…
  • Orvis Passwords Leaked Twice on Pastebin
    Orvis Passwords Leaked Twice on Pastebin
    Credentials were used to manage everything from firewalls to administrator accounts. This is another example of the impact of unexpected third-party exposures and how fast they are detected.…
  • Preventing & Mitigating Identity Theft
    Preventing & Mitigating Identity Theft
    Firewalls Don’t Stop Dragons podcast: How are our identities stolen? What happens to our identity information after it’s been stolen? Once we realize we’ve been hacked, what can we do to mitigate the damage and recover from the consequences? …
  • Virtual Currencies, Blockchain Technology, and the FinTech Industry
    Virtual Currencies, Blockchain Technology, and the FinTech Industry
    RIMCAST Podcast: The good, bad, and downright scary aspects of virtual currencies and blockchain technology. Luke Wilson explains ways that businesses use blockchain technology, challenges that companies face when implementing blockchain, and how …
  • Unmask cybercriminals through identity attribution
    Unmask cybercriminals through identity attribution
    Security operation leaders need to understand that there is always a real person behind an attack, so shifting to catch the culprit and their cohorts rather than playing the repetitive game of defensive whack-a-mole will be essential moving forward. …
  • The Proactive Approach to Identifying Cybercriminals
    The Proactive Approach to Identifying Cybercriminals
    Businesses today can’t afford to just be on the defense in fighting cybercrime. There’s always a real person behind an attack, and security operation leaders need to shift their focus to proactively catching the anonymous culprits behind a computer. …
  • Evolving digital security threats require ‘cyber vigor’
    Evolving digital security threats require ‘cyber vigor’
    How to be proactive defenders? Currently, companies sit connected to the internet as unknowing defenders. Let’s banish this reactionary outlook to the past. In this dangerous environment, we now inhabit, we must stay ahead of digital wrongdoing by …
  • Five Ways to Prevent the Capital One Breach from Happening to You
    Five Ways to Prevent the Capital One Breach from Happening to You
    A poorly configured Amazon cloud database resulted in the Capital One breach exposing the information of 106 million U.S. and Canadian customers. What are the five steps that organizations can take to prevent such attacks?…
  • Why The Financial Services Industry Needs Identity Intelligence
    Why The Financial Services Industry Needs Identity Intelligence
    More than 25% of all malware attacks target the financial services industry – this is more than any other field, and to make matters worse, attacks are continuing to rise. As cybercriminals have more tools at their disposal than ever before, …
  • Scratching the Surface
    Scratching the Surface
    An in-depth look at how stolen card data is exploited on the dark web and beyond.…
  • Should Companies Retaliate Against Hackers? Here’s What Experts Are Saying.
    Should Companies Retaliate Against Hackers? Here’s What Experts Are Saying.
    Is ‘Cyber Vigor’ the Right Path Forward? A muscular undertaking demands a paradigm shift in approach. Mr. de Urioste advocates cyber vigor, a commitment by companies to stay a step ahead of bad actors. This means worse-case scenario planning on the …
  • Technology Executives Are Very Concerned About Cybersecurity, And Financial Services Execs Should Be Too
    Technology Executives Are Very Concerned About Cybersecurity, And Financial Services Execs Should Be Too
    Over 25% of all malware attacks target banking and financial services, more than any other industry. And according to Monica Pal, CEO of identity intelligence company 4iQ, the number of compromised credit cards, credential leaks, and instances of …
  • Cybercriminals are increasingly targeting the financial services industry
    Cybercriminals are increasingly targeting the financial services industry
    The increasing digitization of financial services, via cashless payments with cards (card not present) and mobile apps, has led to greater overall digital capital flow. As more capital circulates on the digital marketplace, companies become …
  • Who’s Behind the GandCrab Ransomware?
    Who’s Behind the GandCrab Ransomware?
    4iQ is proud to have assisted in Brian Krebs’ research finding the crooks behind an affiliate program that paid cybercriminals to install the destructive and wildly successful GandCrab ransomware strain announced on May 31, 2019 they were …
  • Tracing the Supply Chain Attack on Android
    Tracing the Supply Chain Attack on Android
    Earlier this month, Google disclosed that a supply chain attack by one of its vendors resulted in malicious software being pre-installed on millions of new budget Android devices. Google didn’t exactly name those responsible but said it believes the …
  • 5
    15 Small Business Cyber Security Statistics That You Need to Know
    Here is a list of some of the small business cybersecurity statistics you SHOULD know in one convenient resource and understand why SMBs make such attractive targets and what you can do to protect your business.…
  • One Year After GDPR: Is Our Personal Data Safer?
    One Year After GDPR: Is Our Personal Data Safer?
    Organizations worked to optimize security in preparation for GDPR. However, security optimization has been a continuous effort for most organizations long before this regulation was introduced. Yet we continue to see studies indicating increases in …
  • Darknet Intelligence: Using the Dark Web for Security Intelligence
    Darknet Intelligence: Using the Dark Web for Security Intelligence
    Ignoring the Darknet is No Longer an Option. The darknet is a treasure trove of cybersecurity data. Applying automation to the collection of meaningful data means we can ‘listen in’ on cybercriminals and their plans.…
  • Cyber Security Roundup for March 2019
    Cyber Security Roundup for March 2019
    Data breaches are up 400% in 2018 according to a report by 4iQ, with almost 15 billion records exposed. The top 10 biggest breaches of 2018 were Anti-Public Combo Collections, Aadhaar, India, Marriott Starwood Hotels, Exactis…
  • Cybercriminals’ New Favorite Targets: Small Businesses and Supply-Chain Nodes
    Cybercriminals’ New Favorite Targets: Small Businesses and Supply-Chain Nodes
    While cybercrime and data breaches have become increasingly common, there has been a disturbing trend taking place in which cyber criminals have been shifting focus to the “long tail.” Part of the trend has involved increasingly recirculating bigger …
  • Over 25% of SMEs fail to implement any cyber security measures
    Over 25% of SMEs fail to implement any cyber security measures
    Small to medium sized organisations were the prime target of cyber criminals in 2018 according to a recent report by cyber security firm 4iQ. The report highlights that cyber criminals are correct to target SMEs as 32% have failed to take any action …
  • Notes from the Asia-Pacific region, 15 March 2019
    Notes from the Asia-Pacific region, 15 March 2019
    An interesting study by identity intelligence company 4iQ attempts to shed some light in this area. According to the study, there were 12,499 new breaches in 2018, an increase of more than 400 percent from the preceding year. A total of 14.9 billion …
  • Data Breaches: Beyond Exposing Identities
    Data Breaches: Beyond Exposing Identities
    Exploring the implications of adversaries or competitors using compromised networks to gain a business advantage under the guise of a data breach. At 4iQ, we’ve continued to observe the flourishing trade of PII in underground communities and the …
  • News Insights: 2019 Identity Breach Report – 4iQ
    News Insights: 2019 Identity Breach Report – 4iQ
    According to a new report from 4IQ, there were 12,449 confirmed data breaches in 2018, a 424% increase when compared with 2017. Also, 47% of all compromised identity records were exposed in breaches from the United States and China.…
  • Low-hanging fruit: Cybercriminals increasingly targeting small businesses
    Low-hanging fruit: Cybercriminals increasingly targeting small businesses
    According to 4iQ, large organizations continued to focus on improving their security posture in 2018. On the flip side, however, small businesses and suppliers to those companies present “weak links in the value chain”.…
  • Cybercriminals Think Small to Earn Big
    Cybercriminals Think Small to Earn Big
    Small and midsize businesses can’t afford to take the same measures, as they have little to no security budgets and lack skills they need to defend against cybercrime. Large companies have historically been prime breach targets, but hackers …
  • Data breaches up 400 percent, 15 billion records compromised: report
    Data breaches up 400 percent, 15 billion records compromised: report
    4iQ’s annual report confirmed 12,440 new breaches, a 424 percent increase compared to 2017, and of the 14.9 billion records compromised, 3.6 billion were confirmed real and exposed for the first time and were not part of an earlier breach. …
  • Breaches and Leaks Soared 424% in 2018
    Breaches and Leaks Soared 424% in 2018
    Cyber-criminals are also getting smarter about how they organize, aggregate and package data sets. Stolen personally identifiable information (PII) is combined with publicly available data to enable more successful account takeover, identity theft, …
  • The Changing Landscape of Dark Web Identities
    The Changing Landscape of Dark Web Identities
    While mega data breaches gain the most attention, the long tail of smaller breaches is largely ignored. Monica Pal of 4iQ shares findings on recent breach trends. In a video interview with Information Security Media Group at RSA Conference 2019 in …
  • Data breach incidents quadrupled in 2018 as hackers turned on small businesses
    Data breach incidents quadrupled in 2018 as hackers turned on small businesses
    4iQ’s analysis showed that forums and referral websites were most vulnerable, accounting for more than 3,400, or 27.5% of the hacks detected by the company. Gaming and gambling websites and ecommerce platforms were also particularly vulnerable, with …
  • 2,449
    12,449 Data Breaches Confirmed in 2018, a 424% Increase Over the Previous Year
    The number of confirmed data breaches during 2018 reached 12,449, a 424% increase when compared with 2017, 47% of all compromised identity records having been exposed in breaches experienced by organizations from the United States and China.…
  • Why don’t companies come clean after a data breach?
    Why don’t companies come clean after a data breach?
    Done right, companies that suffer a data breach generally take an approach that’s proactive, honest and transparent. After learning that a company has suffered a breach, the common advice is to swiftly investigate the situation, identify and mend …
  • To catch a cyberthief
    To catch a cyberthief
    Attacking cybercrime from multiple angles, while not new, is also important and something that must continue. “I think it’s important to collaborate. To send out a joint message that there will be consequences and perhaps make them [cybercriminals] …
  • Even as the government shutdown ends, expect a spike in IRS phishing attacks
    Even as the government shutdown ends, expect a spike in IRS phishing attacks
    Phishing attempts have spiked in recent years, and with the IRS unable to offer as much protection due to the shutdown, taxpayers are especially vulnerable. According to the IRS, over the last year, there was a 60 per cent increase in illegal email …
  • The Dawn of the Code War, or ‘The Blurred World War’
    The Dawn of the Code War, or ‘The Blurred World War’
    Like the Cold War, the Code War is not what we think of as war; it is a complicated, multidimensional, international period of tension that requires resources across government and the private sector. It is being fought online in an environment of …
  • With cybersecurity threats looming, the government shutdown is putting America at risk
    With cybersecurity threats looming, the government shutdown is putting America at risk
    Unlike the government, our nation’s enemies don’t “shut down.” When our nation’s cyber centers are not actively monitoring and protecting our most valuable assets and critical infrastructure, threats magnify and vulnerabilities become further …
Featured
  • The cyber-threat landscape amid Covid-19
    The cyber-threat landscape amid Covid-19
    As long as COVID-19 precautions remain in place and pervade almost every aspect of our lives, we must continue to increase our cybersecurity safeguards and remain on high alert for suspicious activity.…
  • Cybercriminals Turn to Fake News, COVID-19 Hoax Websites & Email Scams
    Cybercriminals Turn to Fake News, COVID-19 Hoax Websites & Email Scams
    Remote work is here to stay. Claire Umeda, Vice President of Marketing at 4iQ, spotlights how to improve employees’ cybersecurity awareness with best practices. With simple steps, individuals can enhance their home’s security posture and in turn, …
  • Previously Exposed Credentials Recirculate Underground
    Previously Exposed Credentials Recirculate Underground
    What can consumers do if their data is already out there circulating? Big combo packages surface, billions of email addresses or usernames associated with clear-text passwords recirculate in underground communities, making the data increasingly …
  • Uptick in Nation State Misinformation Campaigns and Cyberattacks on Healthcare Sector
    Uptick in Nation State Misinformation Campaigns and Cyberattacks on Healthcare Sector
    4iQ‘s newest COVID-19 Threat Report reveals COVID-19 cyber attack trends – Sextortion/blackmail emails, fake news, ransomware and phishing campaigns and why it is crucial than ever before to take heightened precautions and be more …
  • Cloud Mitigation for Ransomware, as COVID-19 Spurs Cyberattacks
    Cloud Mitigation for Ransomware, as COVID-19 Spurs Cyberattacks
    The threat intelligence team of 4iQ analyzed data collected on cybercrime campaigns leveraged between January 1 and May 1, to track prominent hacking trends spurred by the COVID-19 pandemic. The report showed misinformation campaigns, COVID-19 hoax …
  • New 4iQ Report Shows Uptick in Nation State Misinformation Campaigns, Cyber Attacks on Healthcare Sector Amid COVID-19
    New 4iQ Report Shows Uptick in Nation State Misinformation Campaigns, Cyber Attacks on Healthcare Sector Amid COVID-19
    4iQ, a leader in Adversary Intelligence, today released its COVID-19 Threat Report, which explores a host of notable scams that have surfaced during these uncertain times, including sextortion/blackmail emails, fake news, ransomware and phishing …
  • Protecting against emerging cyber threats during COVID and beyond Podcast
    Protecting against emerging cyber threats during COVID and beyond Podcast
    Amyn Gilani, VP of Product, discusses the rise of COVID-19 based cyber scams that exploit fear and uncertainty via social engineering. Listen to cxLoyalty Podcast as he talks about how cybercriminals are taking advantage of online behaviour and …
  • The Weaponization of Our Digital Identities
    The Weaponization of Our Digital Identities
    A total of 18.7 billion raw identity records circulating in underground communities — a 25.5% increase from the year prior. What does that mean? 4iQ’s VP of Marketing Claire Umeda offers a unique perspective on 2020 Identity Breach Report …
  • Cyber Threats Don’t Require Sensationalism
    Cyber Threats Don’t Require Sensationalism
    There is a fine line between informing the masses and spreading fear. Communicating cyber threats to people and make them aware of the cybercrimes and related issues are important but it even more important to understand why it is occurring at the …
  • 020
    2020 Innovators’ Showcase Honorees
    Intelligence and National Security Alliance (INSA) selects 4iQ as a 2020 Innovators’ Showcase Honoree with the Intelligence and National Security Foundation (INSF) in partnership with the Office of the Director of National Intelligence.…
  • Hunting criminals and stolen identities across the internet
    Hunting criminals and stolen identities across the internet
    Listen to Cyber Work Podcast with Amyn Gilani, Vice President of Product at 4iQ as he talks about his path from red teaming to cyber attribution intelligence, where bad guys hide on the internet, and what it’s like to be “on a mission to unmask …
  • What’s Lurking in Your Supply Chain?
    What’s Lurking in Your Supply Chain?
    4iQ Founder & CTO Julio Casal warns about the overlooked source of vulnerability in the supply chain and what steps can your organization take to prevent these attacks. If you can’t honestly say you are fully apprised of the security …
  • Identity-Based Cyber Attacks Continue to Rise
    Identity-Based Cyber Attacks Continue to Rise
    To prevent exploitative cybercriminals from causing further damage to our personal privacy and our enterprise security during this vulnerable time, we must understand how these threat actors operate. A good place to start is to examine recent trends …
  • Best Practices to Fight Phishing & Strengthen Cybersecurity in COVID-19 Era
    Best Practices to Fight Phishing & Strengthen Cybersecurity in COVID-19 Era
    Claire Umeda, Vice President of Marketing at 4iQ spotlights how to improve employees’ cybersecurity awareness with best practices. Working from home full-time is the new normal for millions of Americans. While this certainly prevents the spread of …
  • Crypto Companies, Law Enforcement and Intelligence Firms Team Up to Fight Human Trafficking
    Crypto Companies, Law Enforcement and Intelligence Firms Team Up to Fight Human Trafficking
    4iQ VP of Intelligence Luke Wilson recently spoke with Cointelegraph to discuss 4iQ’s work, as part of the anti-human trafficking cryptocurrency consortium (ATCC), to help unmask and demystify bad actors in the human trafficking realm. The …
  • Identity-Based Attacks Proliferate as Exposed Credentials Become More Intimate
    Identity-Based Attacks Proliferate as Exposed Credentials Become More Intimate
    Preventing identity-based attacks such as account takeover (ATO) fraud and Business Email Compromise (BEC) begins with securing your personally identifiable information (PII), but this seems to be increasingly difficult as cybercriminals continue to …
  • iQ
    4iQ Report: The Era of Weaponized Data Breaches
    4iQ’s latest report offers a unique perspective on how the underground Breach Economy reflects the severity of targeted public/private sector cyber intrusions and provides exclusive insight into what is reported (and not reported) in the news …
  • Interview with Mike Fleck – How cybersecurity will change over the next few years.
    Interview with Mike Fleck – How cybersecurity will change over the next few years.
    Read the interview of Mike Fleck, VP of Identity Protection, at 4iQ on what drew him to cybersecurity and about changing cybersecurity trends, what are the biggest cybersecurity threat today and how will the cyberthreat landscape change over the …
  • Cybercriminals Continue to Prey on Coronavirus Fear
    Cybercriminals Continue to Prey on Coronavirus Fear
    In the midst of this public health crisis, cyber-attacks in the healthcare sector increased by 150% during the last two months alone. Looking ahead, there are simple steps that individuals and businesses can take to mitigate cybercrime.…
  • International Cybersecurity Experts Come Together to Fight COVID-19 Related Cyberthreats
    International Cybersecurity Experts Come Together to Fight COVID-19 Related Cyberthreats
    C5 Alliance is a response to a 150% increase in healthcare cyberattacks in the last two months, such as phishing emails pretending to be from the World Health Organization (WHO), and ransomware. The alliance will help ensure hospitals and clinics …
  • COVID-19: Best Practices to Safeguard Organizations from Cybercriminals
    COVID-19: Best Practices to Safeguard Organizations from Cybercriminals
    Our critical healthcare infrastructure is vulnerable at this time, no doubt, but it truly has been inspiring to see doctors, scientists, and other industry professionals from around the world come together to stop the spread of COVID-19. To fend off …
  • For Coronavirus, Take Care of Personal and Cyber Hygiene
    For Coronavirus, Take Care of Personal and Cyber Hygiene
    Cybercriminals are exploiting the vulnerable public during this time of crisis by launching massive phishing campaigns.  As individuals, we must continue to make smart cyber hygiene decisions to keep ourselves, and our networks, safe.…
  • Small Businesses Beware: Why the Adversary Values Your Data
    Small Businesses Beware: Why the Adversary Values Your Data
    Small businesses are just as attractive to cyber-attackers as larger enterprises, so cybersecurity should be a top priority for any organization, big or small. Learn what steps small businesses can take right away to address this problem.…
  • Cybercriminals are Exploiting Coronavirus Fears
    Cybercriminals are Exploiting Coronavirus Fears
    Cyber hygiene best practices for organizations to reduce the cybercrime risk and make smarter security decisions amid the chaos.…
  • Why hackers are more persistent than security teams
    Why hackers are more persistent than security teams
    The importance of knowing your attacker –  Is it a sophisticated lock picker on your network or a script kiddie looking for an unlocked door? Equip yourself with identity intelligence for better mitigation and response methods.…
  • Uncover the Real Identities Behind Criminal Activities
    Uncover the Real Identities Behind Criminal Activities
    A modern approach to crime-fighting with Adversary Intelligence and uncovering the real identity of threat actors.…
  • French Firms Rocked by Kasbah Hacker?
    French Firms Rocked by Kasbah Hacker?
    4iQ is proud to have assisted Brian Krebs in his investigation explaining how a large number of French critical infrastructure firms were hacked as part of an extended malware campaign that appears to have been orchestrated by at least one attacker …
  • Publicly available information puts democracy at risk
    Publicly available information puts democracy at risk
    Cybercriminals are weaponizing some quite rudimentary tools and techniques with criminal persistence at volume to harm individuals and businesses financially and reputationally. Learn how threat actors continue to use publicly available information …
  • How data science tools can lighten the load for cybersecurity teams
    How data science tools can lighten the load for cybersecurity teams
    The role of data science in security operations centers; reducing manual workloads, helping identify attack patterns and increasing the chances of detecting threats before it’s too late.…
  • Are Periodic Password Resets Necessary?
    Are Periodic Password Resets Necessary?
    The cons of frequent resets and best practices for password management in an era of continuous evolving cyber threats.…
  • Weaponized Data Breaches: Fueling a Global Cyber Cold War
    Weaponized Data Breaches: Fueling a Global Cyber Cold War
    The new era battlefield of obfuscated identities and anonymous adversaries that have weaponized data breaches and publicly available information – putting democracy at risk.…
  • How to Avoid Identity Theft: Interview with Luke Wilson, 4iQ
    How to Avoid Identity Theft: Interview with Luke Wilson, 4iQ
    Luke Wilson, VP of Intelligence, discussing challenges with cybersecurity, digital privacy, identity theft and keeping kids safe online.…
  • Addressing Data Breaches: How to Stop Them
    Addressing Data Breaches: How to Stop Them
    CEO Monica Pal on how data breaches affect companies, consumers, and government, the misaligned expectations of what should happen when they occur, and what can be done to prevent them in the future.…
  • Orvis Passwords Leaked Twice on Pastebin
    Orvis Passwords Leaked Twice on Pastebin
    Credentials were used to manage everything from firewalls to administrator accounts. This is another example of the impact of unexpected third-party exposures and how fast they are detected.…
  • Preventing & Mitigating Identity Theft
    Preventing & Mitigating Identity Theft
    Firewalls Don’t Stop Dragons podcast: How are our identities stolen? What happens to our identity information after it’s been stolen? Once we realize we’ve been hacked, what can we do to mitigate the damage and recover from the consequences? …
  • Virtual Currencies, Blockchain Technology, and the FinTech Industry
    Virtual Currencies, Blockchain Technology, and the FinTech Industry
    RIMCAST Podcast: The good, bad, and downright scary aspects of virtual currencies and blockchain technology. Luke Wilson explains ways that businesses use blockchain technology, challenges that companies face when implementing blockchain, and how …
  • Unmask cybercriminals through identity attribution
    Unmask cybercriminals through identity attribution
    Security operation leaders need to understand that there is always a real person behind an attack, so shifting to catch the culprit and their cohorts rather than playing the repetitive game of defensive whack-a-mole will be essential moving forward. …
  • The Proactive Approach to Identifying Cybercriminals
    The Proactive Approach to Identifying Cybercriminals
    Businesses today can’t afford to just be on the defense in fighting cybercrime. There’s always a real person behind an attack, and security operation leaders need to shift their focus to proactively catching the anonymous culprits behind a computer. …
  • Evolving digital security threats require ‘cyber vigor’
    Evolving digital security threats require ‘cyber vigor’
    How to be proactive defenders? Currently, companies sit connected to the internet as unknowing defenders. Let’s banish this reactionary outlook to the past. In this dangerous environment, we now inhabit, we must stay ahead of digital wrongdoing by …
  • Five Ways to Prevent the Capital One Breach from Happening to You
    Five Ways to Prevent the Capital One Breach from Happening to You
    A poorly configured Amazon cloud database resulted in the Capital One breach exposing the information of 106 million U.S. and Canadian customers. What are the five steps that organizations can take to prevent such attacks?…
  • Why The Financial Services Industry Needs Identity Intelligence
    Why The Financial Services Industry Needs Identity Intelligence
    More than 25% of all malware attacks target the financial services industry – this is more than any other field, and to make matters worse, attacks are continuing to rise. As cybercriminals have more tools at their disposal than ever before, …
  • Scratching the Surface
    Scratching the Surface
    An in-depth look at how stolen card data is exploited on the dark web and beyond.…
  • Should Companies Retaliate Against Hackers? Here’s What Experts Are Saying.
    Should Companies Retaliate Against Hackers? Here’s What Experts Are Saying.
    Is ‘Cyber Vigor’ the Right Path Forward? A muscular undertaking demands a paradigm shift in approach. Mr. de Urioste advocates cyber vigor, a commitment by companies to stay a step ahead of bad actors. This means worse-case scenario planning on the …
  • Technology Executives Are Very Concerned About Cybersecurity, And Financial Services Execs Should Be Too
    Technology Executives Are Very Concerned About Cybersecurity, And Financial Services Execs Should Be Too
    Over 25% of all malware attacks target banking and financial services, more than any other industry. And according to Monica Pal, CEO of identity intelligence company 4iQ, the number of compromised credit cards, credential leaks, and instances of …
  • Cybercriminals are increasingly targeting the financial services industry
    Cybercriminals are increasingly targeting the financial services industry
    The increasing digitization of financial services, via cashless payments with cards (card not present) and mobile apps, has led to greater overall digital capital flow. As more capital circulates on the digital marketplace, companies become …
  • Who’s Behind the GandCrab Ransomware?
    Who’s Behind the GandCrab Ransomware?
    4iQ is proud to have assisted in Brian Krebs’ research finding the crooks behind an affiliate program that paid cybercriminals to install the destructive and wildly successful GandCrab ransomware strain announced on May 31, 2019 they were …
  • Tracing the Supply Chain Attack on Android
    Tracing the Supply Chain Attack on Android
    Earlier this month, Google disclosed that a supply chain attack by one of its vendors resulted in malicious software being pre-installed on millions of new budget Android devices. Google didn’t exactly name those responsible but said it believes the …
  • 5
    15 Small Business Cyber Security Statistics That You Need to Know
    Here is a list of some of the small business cybersecurity statistics you SHOULD know in one convenient resource and understand why SMBs make such attractive targets and what you can do to protect your business.…
  • One Year After GDPR: Is Our Personal Data Safer?
    One Year After GDPR: Is Our Personal Data Safer?
    Organizations worked to optimize security in preparation for GDPR. However, security optimization has been a continuous effort for most organizations long before this regulation was introduced. Yet we continue to see studies indicating increases in …
  • Darknet Intelligence: Using the Dark Web for Security Intelligence
    Darknet Intelligence: Using the Dark Web for Security Intelligence
    Ignoring the Darknet is No Longer an Option. The darknet is a treasure trove of cybersecurity data. Applying automation to the collection of meaningful data means we can ‘listen in’ on cybercriminals and their plans.…
  • Cyber Security Roundup for March 2019
    Cyber Security Roundup for March 2019
    Data breaches are up 400% in 2018 according to a report by 4iQ, with almost 15 billion records exposed. The top 10 biggest breaches of 2018 were Anti-Public Combo Collections, Aadhaar, India, Marriott Starwood Hotels, Exactis…
  • Cybercriminals’ New Favorite Targets: Small Businesses and Supply-Chain Nodes
    Cybercriminals’ New Favorite Targets: Small Businesses and Supply-Chain Nodes
    While cybercrime and data breaches have become increasingly common, there has been a disturbing trend taking place in which cyber criminals have been shifting focus to the “long tail.” Part of the trend has involved increasingly recirculating bigger …
  • Over 25% of SMEs fail to implement any cyber security measures
    Over 25% of SMEs fail to implement any cyber security measures
    Small to medium sized organisations were the prime target of cyber criminals in 2018 according to a recent report by cyber security firm 4iQ. The report highlights that cyber criminals are correct to target SMEs as 32% have failed to take any action …
  • Notes from the Asia-Pacific region, 15 March 2019
    Notes from the Asia-Pacific region, 15 March 2019
    An interesting study by identity intelligence company 4iQ attempts to shed some light in this area. According to the study, there were 12,499 new breaches in 2018, an increase of more than 400 percent from the preceding year. A total of 14.9 billion …
  • Data Breaches: Beyond Exposing Identities
    Data Breaches: Beyond Exposing Identities
    Exploring the implications of adversaries or competitors using compromised networks to gain a business advantage under the guise of a data breach. At 4iQ, we’ve continued to observe the flourishing trade of PII in underground communities and the …
  • News Insights: 2019 Identity Breach Report – 4iQ
    News Insights: 2019 Identity Breach Report – 4iQ
    According to a new report from 4IQ, there were 12,449 confirmed data breaches in 2018, a 424% increase when compared with 2017. Also, 47% of all compromised identity records were exposed in breaches from the United States and China.…
  • Low-hanging fruit: Cybercriminals increasingly targeting small businesses
    Low-hanging fruit: Cybercriminals increasingly targeting small businesses
    According to 4iQ, large organizations continued to focus on improving their security posture in 2018. On the flip side, however, small businesses and suppliers to those companies present “weak links in the value chain”.…
  • Cybercriminals Think Small to Earn Big
    Cybercriminals Think Small to Earn Big
    Small and midsize businesses can’t afford to take the same measures, as they have little to no security budgets and lack skills they need to defend against cybercrime. Large companies have historically been prime breach targets, but hackers …
  • Data breaches up 400 percent, 15 billion records compromised: report
    Data breaches up 400 percent, 15 billion records compromised: report
    4iQ’s annual report confirmed 12,440 new breaches, a 424 percent increase compared to 2017, and of the 14.9 billion records compromised, 3.6 billion were confirmed real and exposed for the first time and were not part of an earlier breach. …
  • Breaches and Leaks Soared 424% in 2018
    Breaches and Leaks Soared 424% in 2018
    Cyber-criminals are also getting smarter about how they organize, aggregate and package data sets. Stolen personally identifiable information (PII) is combined with publicly available data to enable more successful account takeover, identity theft, …
  • The Changing Landscape of Dark Web Identities
    The Changing Landscape of Dark Web Identities
    While mega data breaches gain the most attention, the long tail of smaller breaches is largely ignored. Monica Pal of 4iQ shares findings on recent breach trends. In a video interview with Information Security Media Group at RSA Conference 2019 in …
  • Data breach incidents quadrupled in 2018 as hackers turned on small businesses
    Data breach incidents quadrupled in 2018 as hackers turned on small businesses
    4iQ’s analysis showed that forums and referral websites were most vulnerable, accounting for more than 3,400, or 27.5% of the hacks detected by the company. Gaming and gambling websites and ecommerce platforms were also particularly vulnerable, with …
  • 2,449
    12,449 Data Breaches Confirmed in 2018, a 424% Increase Over the Previous Year
    The number of confirmed data breaches during 2018 reached 12,449, a 424% increase when compared with 2017, 47% of all compromised identity records having been exposed in breaches experienced by organizations from the United States and China.…
  • Why don’t companies come clean after a data breach?
    Why don’t companies come clean after a data breach?
    Done right, companies that suffer a data breach generally take an approach that’s proactive, honest and transparent. After learning that a company has suffered a breach, the common advice is to swiftly investigate the situation, identify and mend …
  • To catch a cyberthief
    To catch a cyberthief
    Attacking cybercrime from multiple angles, while not new, is also important and something that must continue. “I think it’s important to collaborate. To send out a joint message that there will be consequences and perhaps make them [cybercriminals] …
  • Even as the government shutdown ends, expect a spike in IRS phishing attacks
    Even as the government shutdown ends, expect a spike in IRS phishing attacks
    Phishing attempts have spiked in recent years, and with the IRS unable to offer as much protection due to the shutdown, taxpayers are especially vulnerable. According to the IRS, over the last year, there was a 60 per cent increase in illegal email …
  • The Dawn of the Code War, or ‘The Blurred World War’
    The Dawn of the Code War, or ‘The Blurred World War’
    Like the Cold War, the Code War is not what we think of as war; it is a complicated, multidimensional, international period of tension that requires resources across government and the private sector. It is being fought online in an environment of …
  • With cybersecurity threats looming, the government shutdown is putting America at risk
    With cybersecurity threats looming, the government shutdown is putting America at risk
    Unlike the government, our nation’s enemies don’t “shut down.” When our nation’s cyber centers are not actively monitoring and protecting our most valuable assets and critical infrastructure, threats magnify and vulnerabilities become further …