Get 24/7 incident response assistance from our global team
- APAC: +65 3159 4398
- EU & NA: +31 20 890 55 59
- MEA: +971 4 540 6400
Get 24/7 incident response assistance from our global team
Please review the following rules before submitting your application:
1. Our main objective is to foster a community of like-minded individuals dedicated to combatting cybercrime and who have never engaged in Blackhat activities.
2. All applications must include research or a research draft. You can find content criteria in the blog. Please provide a link to your research or research draft using the form below.
Watch a critical session by Group-IB's DFIR experts, as they shed light on the latest ransomware tactics seen in the MEA region and guide your incident or infosecurity team through essential preparedness strategies.
Join us as we discuss why businesses in the LATAM region are prime targets for exploitation, given the surge in ransomware attacks, readily available initial access to compromised networks, DDoS attacks, and more.
Join us as we talk about AI threats, the rise in nation-state threat actors, APT groups, persisting ransomware threats and associated data leaks, targeted attacks, and more.
Join us as we talk about why businesses in the region are ripe targets for exploitation, given the surge in APTs, mobile banking trojans targeting iOS users, a significant uptick in ransomware attacks, and more.
Join us as we discuss why businesses in the region are ripe targets for exploitation, given the surge in information-stealing malware, a significant uptick in ransomware attacks, and more.
Join us as we discuss why businesses in the region are prime targets for exploitation, given the increase in compromised cards, public data leaks, rise in APTs and nation-sponsored attacks, and more.
Watch a critical session by Group-IB's DFIR experts, as they shed light on the latest ransomware tactics seen in the MEA region and guide your incident or infosecurity team through essential preparedness strategies.
In this short video we explore the latest scams, regulatory updates, and the key challenges facing the industry.
In this digest, we cover the newest scam schemes, regulatory updates, and industry challenges to keep you posted and your customers protected.
In this video, we will discuss the cases researched at Group-IB, active threats, and the most pressing challenges related to fraud and online scam. Stay tuned to protect your business and customers from fraudsters.
Learn how Group-IB’s joint initiative with CORVIT will help cybersecurity professionals and leaders in cyber activity within the MEA region.
In this video, we will discuss the cases researched at Group-IB, active threats, and the most pressing challenges related to fraud and online scam. Stay tuned to protect your business and customers from fraudsters.
Access exclusive insights from our top-rated Threat Intelligence team on recent cyber threats and how Group-IB can safeguard your sector, country, or region.
Learn how Group-IB’s Incident Response team helps you fight real cybercriminals in the APAC region.
Explore Middle East's ever-evolving cyber security landscape with experts. Watch the insightful webinar recording now to uncover the latest threats, discover effective solutions, and gain valuable insights into emerging trends shaping the region's cybersecurity.
Faites connaissance avec l’équipe de digital forensics et de réponse aux incidents de Group-IB, qui lutte contre la cybercriminalité et intervient dans le monde entier aux côtés des entreprises pour les aider à répondre aux incidents de grande ampleur.
Nous continuons nos webinar Fraud Intel, cette fois dédiée à la région africaine.
Scopri come il gruppo di Digital Forensics e Incident Response di Group-IB combatte i criminali informatici allo scopo di aiutare le aziende a far fronte agli incidenti più devastanti che si verificano in tutto il mondo.
The classic type of scams that increased with the new, easy-to-use broker applications, NFTs, crypto trading platforms, and more.
How Group-IB's Incident Response Team fights against real cyber criminals during incident engagements around the MEA region.
How to effectively stop security incidents in the region.
How Group-IB unifies Attack Surface Management, Digital Risk Protection, Threat Intelligence to complement intelligence
Fraud Intel Series is dedicated to the African region.
Discover the key insights and best practices on implementing a future-proof cyber education strategy in our webinar, equipping you with the knowledge and tools to build a robust framework that prepares individuals and organizations for the ever-evolving cyber landscape.
Get insights on efficient defense against OPERA1ER’s attacks
Découvrez la protection contre la fraude lors de notre webinaire introductif et protégez efficacement votre entreprise contre les activités frauduleuses.
This event was created in collaboration with our experts working hard to equip you with the must-have knowledge about the most recent scam trends and active fraud schemes. This first episode focuses on the VIP impersonation scams.
The event brings together independent analysts and researchers, a variety of cybersecurity specialists, as well as representatives of different industries to share the best practices of building, developing and scaling digital security and brand protection strategies in the time of COVID-19 and beyond.
What does it take to effectively repel a ransomware attack? Learn how to expose ransomware movements and make it harder for them to conduct attacks.
Hindsight, Deep Dive and Moving Forward
Needless to mention, as a region rich on natural resources, the Middle East is inevitably attractive to investors. But what is a magnet for investment, can also be coveted by fraudsters, scammers, or other attackers.
Hunting for signs of impending ransomware attacks in enterprise environment.
A framework for security professionals to manage risk and respond to threats.
Discover Group-IB Fraud Hunting Day: our experts shared the latest fraud hunting techniques, use cases, and talked about different types of fraud clients may face in the Asia-Pacific region.
Get a broad overview of the ransomware market and learn more about its latest developments in CyberCrimeCon 2021 video presentation.
Group-IB Threat Intelligence Head Dmitry Shestakov presentes a report titled “Unexpected guests: who is selling access to your network” that provides an in-depth analysis of the market for the sale of access to corporate networks and its main driving forces.
Anton Ushakov and Roberto Martineztell told about cybercriminal syndicate Fraud Family that developed, sold and rented sophisticated phishing frameworks to other less skilled fraudsters.
Learn more about Evil Corp (EC), an advanced cybercrime operations cluster, in Antonio Pirozzi presentation on CyberCrimeCon 2021.
Rosal Cosano presented on the importance of public-private partnerships in tackling cybercrime around the world, particularly in fighting online and payment fraud.
Meet Craig Jones, INTERPOL's Cybercrime Director at CyberCrimeCon 2021. Explore his presentation as he works to reduce cybercrime's global impact by enhancing law enforcement capabilities.
To provide a comprehensive picture of modern cybercrime, Group-IB experts have prepared annual cyber threat reports. Learn more in Dmitry Volkov presentation at CyberCrimeCon 2021!
Group-IB CEO Dmitry Volkov opened CyberCrimeCon21!
Security Researcher at Computest Thijs Alkemade will share his findings about hacking the pandemic's most popular software — Zoom.
Senior Security Researcher at VNPT Cyber Immunity Quynh Le will shares her findings about attacks on #Java deserialization.
Group-IB Senior Malware Analyst Dmitry Kupin analyzes espionage campaigns of Chinese state-sponsored APT groups in APAC.
Denis Kuvshinov, the head of CTI Group at Positive Technologies, shares with you details on the newly discovered APT group ChamelGang that attacked numerous organizations worldwide.
Group-IB APT Research Analyst Nikita Rostovcev shares his findings on the notorious APT41 group and its recent “world tour,” during which cybercriminals targeted dozens of companies in Asia, Europe, and North America.
Ladislav Baco, Senior Security Consultant and Malware Analys, shares his findings about APT campaign targeting European, governments, diplomats, individuals and think-tanks. Watch the video to learn about the tools and infrastructure used in the attacks.
Cyber Threat Intelligence Manager at CyberSOC Africa Olakanmi Oluwole introduces you to the African and Nigerian Threat Landscape and tells about the takedown of a bank fraud syndicate group.
Group-IB teams up with Virtual Vendors in Australia and New Zealand to deliver local companies rock solid cyber defense.
Cost savings and business benefits enabled by Threat Intelligence
Many organizations believed that they had an effective security program and incident response solutions. However, statistics prove otherwise.
Kamo Basentsyan, Digital Risk Protection and Anti-piracy Development Director, APAC, and Shafique Dawood, Head of Sales and Development, APAC, share valuable insights about latest scam trends and techniques specific to the APAC region.
Webinar hosted by Group-IB with Sanny Mok, Consultant at Forrester and Kadir Yüceer, CEO at IHS Teknolojilearn, to hear first-hand why deploying a new fraud solution might be easier and more rewarding than you think.
Stay ahead of evolving threats in Bahrain with our webinar, as we delve into the dynamic landscape of cybersecurity challenges, providing valuable insights and strategies to effectively address and mitigate the changing threat landscape.
Ashraf Koheil, Regional Sales Director (MEA & Turkey), and Igor Stolyarov, Head of Digital Risk Protection (MEA), share valuable insights about latest scam trends and techniques in MEA region.
The massive cyberattack conducted by infamous ransomware gang REvil affected hundreds of businesses in over a dozen countries.
Adversaries are probing your networks on a daily basis in order to find a way in. An organization that can withstand an intelligence-led, extended simulated attack will have the confidence that it is ready to prevent against the modern-day adversary.
During this webinar, you’ll learn the secrets behind Group-IB’s international success in investigating modern cybercrime.
Join our webinar to discover how Digital Risk Protection can help you win the battle against illegal brand exploitation, providing you with proactive measures and effective strategies to safeguard your brand reputation and combat unauthorized use.
The complete guide to the latest tactics, techniques, and procedures of ransomware operators beased on MITRE ATT&CK®
ThreatQuotient, a leading security operations platform innovator, and Group-IB, a global cybersecurity company, are hosting an informative and interactive seminar focused on the actor-centric threat hunting approach.
Scam as a service targeting emerging economies in APAC via social engineering methods.
Learn about popular online scam techniques, including fake accounts and payment pages, malicious emails and data leaks, and how to properly protect yourself against them
Group-IB’s newest webinar is your one-stop-shop for everything commodity malware. Get an overview of the bots you need to know about and get a first-hand look at how in-memory analysis of commodity malware is conducted.
Nuestro experto comparte valiosos conocimientos sobre las últimas tendencias y técnicas de estafa en el seminario web.
Notre expert partage des informations précieuses sur les dernières tendances et techniques en matière d'escroquerie lors du webinaire !
The scam uses famous brands to deceive people into multistage scam schemes, including fake surveys and visiting fraudulent third-party websites.
Group-IB closely monitors the evolution of cybercriminal tactics, tools and procedures; monitors changes in the global threat landscape and key trends; shares this data with other organizations (government and commercial); and publishes its own research.
Dmitriy Tunkin, Chief Regional Officer, Europe, shares valuable insights about latest scam trends and techniques.
What makes Egregor more dangerous is that it has also become the ransomware of choice for Qakbot operators, who are well known for targeting large enterprise networks and holding data for record high ransoms.
Take your cyber knowledge to the next level with our immersive webinar on Group-IB's hands-on cybersecurity programs. Explore cutting-edge techniques, tools, and real-world scenarios that will enhance your expertise in the field.
Preparati in anticipo: scopri le tattiche, tecniche e procedure (TTP) utilizzate dai gruppi di ransomware nel nostro webinar, per difenderti in modo efficace e proteggere i tuoi dati.
Join our informative webinar to learn essential strategies and best practices on keeping your valuable data secure online in 2020.
Fraud that customers may face during and after the lockdown.
At the center of some of the most recent so-called Big Game Hunting campaigns is ProLock, whose use of the Qakbot Trojan has created a unique kill chain.
96% of all the attacks involving social engineering techniques start in the inboxes. Email is the most common attack vector and there is no sign that this is going to change anytime soon.
RedCurl acts covertly in the network for months to minimize the risk to be discovered. The group then cleverly mimics techniques used by Red Teaming and penetration testing teams to conduct an internal security breach.
There is no limit to how far threat actors will go to bypass classic networked sandboxes. Hackers are constantly inventing new tools and technologies that teach their malware to avoid detection in virtual environments.
Uncover the secrets to selecting the perfect sandbox environment with our expert-led webinar. Learn the crucial do's and don'ts of choosing a sandbox that suits your needs flawlessly.
Explorez au-delà des frontières avec notre enquête captivante lors de notre webinaire, vous offrant des perspectives uniques et approfondies pour comprendre les défis mondiaux et les opportunités émergentes, et vous permettant de prendre des décisions stratégiques éclairées.
Every year, cyberattack numbers increase, and attackers and defenders continue their never-ending game of cat and mouse. This has forced companies to think seriously about increasing their information security maturity level.
Offline businesses often think they won’t be targeted by digital fraud. In reality, the opposite is true. Supermarkets, pharmacies, and fashion retailers are just some of the businesses that have fallen victim to online scammers and that urgently need online Digital Risk Protection.
Hunt or be hunted with SCAfrica in our thrilling webinar, as you explore advanced threat hunting techniques to detect and counter cyberattacks.
In October 2017, Group-IB’s Threat Intelligence (TI) specialists detected the activity of the threat actor known as Fxmsp, who at the time was starting to sell access to various corporate networks belonging to different companies around the world.
Ransomware attacks are on the rise and show no signs of stopping. Stay one step ahead of the enemy by learning about the tactics, techniques, and procedures they used in 2019.
In a world of ever-evolving threats, keeping your Security Operations Center (SOC) technologically and strategically relevant can be a challenge.
Perswaysion is a term coined by one of our Senior Threat Intelligence Analyst, based on a 3-phase phishing campaign which takes a victim from a PDF attached to email, through commonly used file-sharing services, then to the final phishing site.
Your security level is not a constant; it is a variable indicator. Can you have absolute certainty that your data and infrastructure have not been breached?
Many businesses blindly implement Threat Hunting in their infrastructures while remaining unaware of the solution that lies at the core of TH and other security processes.
To look into the illegal use of pharma brands, Group-IB’s Digital Risk Protection team analyzed online sales of seven of the most common drugs produced by various manufacturers.
APIs have become a hidden part of everyday life. Some industries are only beginning to develop their own open API ecosystems, which has made the issue of security highly relevant for them.
The sportswear industry is developing rapidly, which attracts countless counterfeiters who attempt to make money by selling fake products advertised as ones manufactured by genuine sportswear brands.
Discover the top three types of online fraud attacks you're most likely to face in 2020 and learn how to effectively defend against them in our must-attend webinar.
Each new cyberattack aimed at a company, political party, or critical infrastructure facility gives us the opportunity to see the evolution of tactics and tools to carry them out.
Over the past decade, the number of cyberattacks and their complexity have increased significantly, which puts the freedom of communication and global opportunities provided by the Internet at risk.
Level up your Threat Intelligence program: Discover new features and explore powerful use cases in our webinar, empowering you to take the next step in effectively identifying and mitigating threats to safeguard your organization.
Unlock the secrets to building a successful brand protection strategy with our insightful webinar, taking you through three essential steps for safeguarding your brand against infringement and unauthorized use.
Unlock the secrets of tracking the most powerful hacking groups in APAC during our insightful webinar. Learn effective methodologies and techniques to monitor and understand the activities of these prominent threat actors, empowering you to bolster your cybersecurity defenses.
Are you keeping up with the ever-changing cyber threatscape and adapting your security posture accordingly?
In September 2018, Group-IB released the first comprehensive technical report on the cybergang Silence. This webinar cover the findings Group-IB collected in 2019.
Learn more about the effective brand protection approaches and gain valuable insights fraud and scam schemes in our webinar!
Tips&Tricks from Group-IB's high-profile cases in our insightful webinar!
Social engineering, in the context of information security, is the psychological manipulation of people into performing actions or divulging confidential information. It has also been defined as "any act that influences a person to act in a way that may not be in their best interests."
Interbank systems, Card processing, ATMs, Payment gateways
In September 2018, Group-IB released Silence: Moving into the darkside, the first comprehensive technical report on the group’s attacks. The analysis remains the most complete source of technical information about the infrastructure and tools the cybercriminals used between June 2016 and April 2018.
Stay ahead of mobile fraud trends and gain valuable insights into protecting banking apps with our informative webinar.
Gain a competitive edge: Explore competitive advantages, target audience, and effective positioning strategies in our insightful webinar, equipping you with the knowledge to differentiate your business and effectively reach your desired market.
Learn about Cobalt’s development and modification of tools and tactics which were used to steal approximately 1 billion dollars from over 100 banks in 40 different countries.
Due to continued media attention and alleged connections to North Korea, Lazarus has become a well-known hacking group. However, existing attribution based primarily on malware code similarities is not always reliable
Cobalt group was first revealed in 2016. It is known for stealing cash directly from the ATMs with “touchless jackpotting” attacks.
Gain valuable insights and exclusive forecasts from Group IB's annual research in 2017, as our webinar highlights key findings that shape the cybersecurity landscape and provide a deeper understanding of emerging threats and trends.
Group-IB has recently released a report outlining the activity of a previously unknown targeted attack group that we are dubbing "MoneyTaker"
The "Cobalt" cyber-criminal group has garnered international attention and focus from the security community from their unique methods of conducting targeted attacks on financial institutions.