#cybersecurity #southafrica
Group-IB Signs Partnership Agreement with Corr-Serve in South Africa
Group-IB has signed a partnership agreement with Corr-Serve, a South African value-added distributor of IT solutions. The partnership allows Corr-Serve to bolster its cybersecurity portfolio with the full stack Group-IB’s solutions and services, dedicated to detecting and preventing cyberattacks, including with cyber threat intelligence, in-depth attack analysis, and effective incident response.
Click here for more details: https://bit.ly/3KCFYY5
Group-IB Signs Partnership Agreement with Corr-Serve in South Africa
Group-IB has signed a partnership agreement with Corr-Serve, a South African value-added distributor of IT solutions. The partnership allows Corr-Serve to bolster its cybersecurity portfolio with the full stack Group-IB’s solutions and services, dedicated to detecting and preventing cyberattacks, including with cyber threat intelligence, in-depth attack analysis, and effective incident response.
Click here for more details: https://bit.ly/3KCFYY5
#scam #fraud #DRP #podcast
Group-IB at IM24 podcast🎙
We all have recently evidenced the explosive growth of online scams 👿 Criminals skillfully use all the existing opportunities, improve their social engineering techniques and use new technologies to be even more effective. What is the current landscape of such threats and how can one prevent this type of crime?
This is what Dmitriy Tiunkin, the Group-IB Digital Risk Protection head, Europe, discusses with Michal Porada, the host of Ingram Micro’s IM24 Podcast ⬇️
https://www.youtube.com/watch?v=24X1tf37SV4&t=504s&ab_channel=Group-IBGlobal
Group-IB at IM24 podcast🎙
We all have recently evidenced the explosive growth of online scams 👿 Criminals skillfully use all the existing opportunities, improve their social engineering techniques and use new technologies to be even more effective. What is the current landscape of such threats and how can one prevent this type of crime?
This is what Dmitriy Tiunkin, the Group-IB Digital Risk Protection head, Europe, discusses with Michal Porada, the host of Ingram Micro’s IM24 Podcast ⬇️
https://www.youtube.com/watch?v=24X1tf37SV4&t=504s&ab_channel=Group-IBGlobal
#cybersecurity #fraudhunting #webinar
Group-IB Fraud Hunting Day in APAC
Join Group-IB Fraud Hunting Day where our experts will share the latest fraud hunting techniques, use cases, and talk about different types of fraud clients may face in the Asia-Pacific region.
Save your spot now: https://bit.ly/3rO51Pa
Group-IB Fraud Hunting Day in APAC
Join Group-IB Fraud Hunting Day where our experts will share the latest fraud hunting techniques, use cases, and talk about different types of fraud clients may face in the Asia-Pacific region.
Save your spot now: https://bit.ly/3rO51Pa
#blog #ML #CyberInvestigation #leak #breach #ShinyHunters
New blog post 🔥 Shedding light on the dark web: Cybersecurity analyst's guide on how to use machine learning to show cybercriminals’ true colors 🔍
👉Data leaks appearing on the dark web are a problem that even world-renowned enterprise, financial and IT giants have faced. They can both disclose:
🔸 sensitive information about the company's internal processes;
🔸personal data of the company's customers, making them turn their back on a brand or company that used to be their favorite.
Both outcomes can bring the business at the verge of collapse.
In our new blog post, Group-IB Head of investigation department in APAC Vesta Matveeva and Group-IB Senior Data Scientist in APAC Iaroslav Polianskii show the methods cybersecurity analysts who come to the aid of compromised companies can use to, firstly, determine if an alleged data breach is real or fake, and, secondly, make conclusions about the sophistication of the threat actor responsible.
Our guide will be useful for:
🔸cybersecurity greeners who are doing their first steps in the cybersecurity world;
🔸cybersecurity analysts and corporate security team members;
🔸machine learning algorithm developers.
Find out more at -> https://bit.ly/3r7vCYd
New blog post 🔥 Shedding light on the dark web: Cybersecurity analyst's guide on how to use machine learning to show cybercriminals’ true colors 🔍
👉Data leaks appearing on the dark web are a problem that even world-renowned enterprise, financial and IT giants have faced. They can both disclose:
🔸 sensitive information about the company's internal processes;
🔸personal data of the company's customers, making them turn their back on a brand or company that used to be their favorite.
Both outcomes can bring the business at the verge of collapse.
In our new blog post, Group-IB Head of investigation department in APAC Vesta Matveeva and Group-IB Senior Data Scientist in APAC Iaroslav Polianskii show the methods cybersecurity analysts who come to the aid of compromised companies can use to, firstly, determine if an alleged data breach is real or fake, and, secondly, make conclusions about the sophistication of the threat actor responsible.
Our guide will be useful for:
🔸cybersecurity greeners who are doing their first steps in the cybersecurity world;
🔸cybersecurity analysts and corporate security team members;
🔸machine learning algorithm developers.
Find out more at -> https://bit.ly/3r7vCYd
Group-IB
Shedding light on the dark web
Cybersecurity analyst's guide on how to use MI to show cybercriminals' true colors
#GIB_TIA #review
Help Net Security issues review of Group-IB’s Threat Intelligence & Attribution system 🏅
The Help Net Security team has reviewed Group-IB’s solution offering customer-tailored data on threats and attackers, Threat Intelligence & Attribution. Recognized by the world’s leading consulting firms like IDC, Forrester and Gartner, Group-IB Threat Intelligence & Attribution enables corporate security teams to analyze threat actors and their TTPs to proactively hunt for cybercriminals and shield their network infrastructure against possible attacks.
👉From the review you’ll learn what technical and operational data Group-IB's Threat Intelligence & Attribution provides and how users of the system can benefit from it to bolster their cybersecurity posture. The story will raise the curtain on the solution’s set-up and give you insights about its killer features.
Make sure to give it a read if you are curious to know more about the testing process, the TI&A functionality and the ultimate conclusion ➡️ https://www.helpnetsecurity.com/2022/02/01/review-group-ib-threat-intelligence-attribution/
Help Net Security issues review of Group-IB’s Threat Intelligence & Attribution system 🏅
The Help Net Security team has reviewed Group-IB’s solution offering customer-tailored data on threats and attackers, Threat Intelligence & Attribution. Recognized by the world’s leading consulting firms like IDC, Forrester and Gartner, Group-IB Threat Intelligence & Attribution enables corporate security teams to analyze threat actors and their TTPs to proactively hunt for cybercriminals and shield their network infrastructure against possible attacks.
👉From the review you’ll learn what technical and operational data Group-IB's Threat Intelligence & Attribution provides and how users of the system can benefit from it to bolster their cybersecurity posture. The story will raise the curtain on the solution’s set-up and give you insights about its killer features.
Make sure to give it a read if you are curious to know more about the testing process, the TI&A functionality and the ultimate conclusion ➡️ https://www.helpnetsecurity.com/2022/02/01/review-group-ib-threat-intelligence-attribution/
Help Net Security
Review: Group-IB Threat Intelligence & Attribution (TI&A)
For this review, we had access to the Group-IB Threat Intelligence & Attribution system, which offers data on threats and attackers.
#CactusCon #LockBit #Ransomware
Group-IB at CactusCon 🌵
Want to learn more about the latest operations of LockBit ransomware? Join Track 3 of the CactusCon, the largest annual hacker and security conference in Arizona, on Feb. 5. Group-IB’s head of DFIR team, Oleg Skulkin, will talk about LockBit’s TTPs and custom tools.
Save your spot now: https://www.eventbrite.com/e/cactuscon-10-tickets-161667538961
Group-IB at CactusCon 🌵
Want to learn more about the latest operations of LockBit ransomware? Join Track 3 of the CactusCon, the largest annual hacker and security conference in Arizona, on Feb. 5. Group-IB’s head of DFIR team, Oleg Skulkin, will talk about LockBit’s TTPs and custom tools.
Save your spot now: https://www.eventbrite.com/e/cactuscon-10-tickets-161667538961
#cloud #email #phishing #cybersecurity
Cleaning the atmosphere: Weak points in modern-day corporate email security
In 26% of incidents investigated by Group-IB’s Digital Forensics Lab, company infrastructure was infected with ransomware through phishing links. According to Verizon, most malware is still delivered by email, with 46% of companies having been attacked almost exclusively via email in 2020, while social engineering was conducted via email 96% of the time. With so many companies and organizations having sped up adopting remote work practices recently, the situation is bound to worsen.
In a new blog post by Ilya Pomerantsev, a product analyst at Group-IB’s Network Security Department, we examine three real-life attacks attempted via corporate email, all of which were detected and stopped by Group-IB’s cloud email protection system Atmosphere.
We’ll take a look at how cybercriminals bypass:
🔹sender verification
🔹email security solutions by using an attachment in a non-standard file format
🔹a sandbox using an office document
Check it out -> https://bit.ly/3HxfZ2j
Cleaning the atmosphere: Weak points in modern-day corporate email security
In 26% of incidents investigated by Group-IB’s Digital Forensics Lab, company infrastructure was infected with ransomware through phishing links. According to Verizon, most malware is still delivered by email, with 46% of companies having been attacked almost exclusively via email in 2020, while social engineering was conducted via email 96% of the time. With so many companies and organizations having sped up adopting remote work practices recently, the situation is bound to worsen.
In a new blog post by Ilya Pomerantsev, a product analyst at Group-IB’s Network Security Department, we examine three real-life attacks attempted via corporate email, all of which were detected and stopped by Group-IB’s cloud email protection system Atmosphere.
We’ll take a look at how cybercriminals bypass:
🔹sender verification
🔹email security solutions by using an attachment in a non-standard file format
🔹a sandbox using an office document
Check it out -> https://bit.ly/3HxfZ2j
#email #security #test
Test your email security with 40+ attack simulations based on real incidents observed by Group-IB. See how you can improve your email protection with our automated security assessment tool — Group-IB Trebuchet.
✅It’s free. Absolutely free.
✅It’s safe. All malware samples were modified to prevent access for attackers.
✅It’s confidential. We do not harvest your data.
✅It’s easy to use. All you need is a separate mailbox within your corporate domain, where Trebuchet will send 40+ emails representing real-life attack scenarios.
✅ It’s actionable. You will see the gaps in your existing email security straight away.
Test your email defenses now -> https://bit.ly/3uvVwqJ
Test your email security with 40+ attack simulations based on real incidents observed by Group-IB. See how you can improve your email protection with our automated security assessment tool — Group-IB Trebuchet.
✅It’s free. Absolutely free.
✅It’s safe. All malware samples were modified to prevent access for attackers.
✅It’s confidential. We do not harvest your data.
✅It’s easy to use. All you need is a separate mailbox within your corporate domain, where Trebuchet will send 40+ emails representing real-life attack scenarios.
✅ It’s actionable. You will see the gaps in your existing email security straight away.
Test your email defenses now -> https://bit.ly/3uvVwqJ
#cybersecurity #antifraud #FHP
Group-IB teams up with Ingenuous
Group-IB has partnered with Ingenuous, a Melbourne-based financial crime prevention company. Group-IB’s flagship product for financial organizations, eCommerce, and government portals, Fraud Hunting Platform (FHP) now becomes available through Intuition by Ingenuous. Group-IB FHP guards more than 250 mln users of both web resources and mobile apps around the world against bot activity, account takeover, fake merchant, malware attacks and other types of fraud.
Ingenuous’s management team has more than 25 years of experience and a proven track record in developing, implementing, and supporting financial crime prevention solutions for the financial sector, insurance, eCommerce, telecom, and government companies across the region. A new partnership between Ingenuous and Group-IB delivers local companies a new level of real-time, enterprise fraud hunting across web and mobile channels.
More details here: https://bit.ly/3rDNuKQ
Group-IB teams up with Ingenuous
Group-IB has partnered with Ingenuous, a Melbourne-based financial crime prevention company. Group-IB’s flagship product for financial organizations, eCommerce, and government portals, Fraud Hunting Platform (FHP) now becomes available through Intuition by Ingenuous. Group-IB FHP guards more than 250 mln users of both web resources and mobile apps around the world against bot activity, account takeover, fake merchant, malware attacks and other types of fraud.
Ingenuous’s management team has more than 25 years of experience and a proven track record in developing, implementing, and supporting financial crime prevention solutions for the financial sector, insurance, eCommerce, telecom, and government companies across the region. A new partnership between Ingenuous and Group-IB delivers local companies a new level of real-time, enterprise fraud hunting across web and mobile channels.
More details here: https://bit.ly/3rDNuKQ
#Ransomware #DFIR #threathunting
Group-IB Threat Hunting Day APAC
Want make your threat hunting operations more efficient?
Tune in to the Threat Hunting Day on March 17 for:
📍A deep dive into ransomware threat landscape
📍A complete breakdown of modern TTPs used by threat actors based on real-world attack scenarios
📍Live demonstration of how to use actionable intelligence to respond to a human-operated ransomware attack in the first stages of its lifecycle
Register here ➡️ https://bit.ly/3gMOhTj
Group-IB Threat Hunting Day APAC
Want make your threat hunting operations more efficient?
Tune in to the Threat Hunting Day on March 17 for:
📍A deep dive into ransomware threat landscape
📍A complete breakdown of modern TTPs used by threat actors based on real-world attack scenarios
📍Live demonstration of how to use actionable intelligence to respond to a human-operated ransomware attack in the first stages of its lifecycle
Register here ➡️ https://bit.ly/3gMOhTj
#Ransomware
Top 5 recommendations for preventing ransomware
With ransomware attacks on the rise, companies need to take a proactive approach to security. Group-IB has put together a list of actionable tips to help you protect your organization from the ransomware threats in 2022.
Check this out: https://bit.ly/34LeUWu
Top 5 recommendations for preventing ransomware
With ransomware attacks on the rise, companies need to take a proactive approach to security. Group-IB has put together a list of actionable tips to help you protect your organization from the ransomware threats in 2022.
Check this out: https://bit.ly/34LeUWu
#CyberPeaceBuilders #Cybersecurity #Volunteers
Group-IB joins the CyberPeace Institute CyberPeaceBuilders' community!
The CyberPeace Builders program members are all volunteers recruited from international companies. The program provides industry-grade expertise to NGOs to understand cyberthreats, to strengthen internal capabilities and up-skill staff to increase their resilience to cyberthreats.
Nick Palmer, head of global business at Group-IB: “The CyberPeace Builders program is something that aligns closely with Group-IB’s mission of investigating and researching cybercrime while helping those they pray on. This initiative will allow Group-IB experts to devote their time as the see fit to help in this mission.”
What does volunteering to be a CyberPeace Builder involve?
🔹Builders are asked to volunteer approx 40 hrs p/year
🔹Builders activities are broken down into small tasks of a few hours maximum.
🔹Builders select the units of work they can do depending on their availability and skills.
🔹Builders use available resources such as online tools and pre-existing materials that can be applied to different cybersecurity needs and to deliver services.
More about the CyberPeaceBuilders community: https://cyberpeaceinstitute.org/cyberpeacebuilders/
Group-IB joins the CyberPeace Institute CyberPeaceBuilders' community!
The CyberPeace Builders program members are all volunteers recruited from international companies. The program provides industry-grade expertise to NGOs to understand cyberthreats, to strengthen internal capabilities and up-skill staff to increase their resilience to cyberthreats.
Nick Palmer, head of global business at Group-IB: “The CyberPeace Builders program is something that aligns closely with Group-IB’s mission of investigating and researching cybercrime while helping those they pray on. This initiative will allow Group-IB experts to devote their time as the see fit to help in this mission.”
What does volunteering to be a CyberPeace Builder involve?
🔹Builders are asked to volunteer approx 40 hrs p/year
🔹Builders activities are broken down into small tasks of a few hours maximum.
🔹Builders select the units of work they can do depending on their availability and skills.
🔹Builders use available resources such as online tools and pre-existing materials that can be applied to different cybersecurity needs and to deliver services.
More about the CyberPeaceBuilders community: https://cyberpeaceinstitute.org/cyberpeacebuilders/
#Award #Cybersecurity
Group-IB wins 8 Gold Cybersecurity Excellence Awards 2022
🥇Group-IB has been named a Gold winner by the Cybersecurity Excellence Award 2022 in the category "Best Cybersecurity Company" in Asia! Additionally, Group-IB’s products and services received Gold across 7 categories.
More details here: https://bit.ly/3gZFAoL
Group-IB wins 8 Gold Cybersecurity Excellence Awards 2022
🥇Group-IB has been named a Gold winner by the Cybersecurity Excellence Award 2022 in the category "Best Cybersecurity Company" in Asia! Additionally, Group-IB’s products and services received Gold across 7 categories.
More details here: https://bit.ly/3gZFAoL
#Vietnam #Webinar #Ransomware #DFIR
Hi-Tech Crime Trends in Vietnam in 2022
Want to learn more about the current financial and ransomware threat landscape in Vietnam? Join Group-IB's webinar on March 24 where our local DFIR expert, Nam Le Phuong, will give an insight into the latest cybersecurity risks in Vietnam and ways to mitigate them.
Register here: https://bit.ly/3IHSW5t
Hi-Tech Crime Trends in Vietnam in 2022
Want to learn more about the current financial and ransomware threat landscape in Vietnam? Join Group-IB's webinar on March 24 where our local DFIR expert, Nam Le Phuong, will give an insight into the latest cybersecurity risks in Vietnam and ways to mitigate them.
Register here: https://bit.ly/3IHSW5t
#ransomware #threatintelligence #webinar #APAC
Group-IB Threat Hunting Day in APAC
Join us as we explore the latest ransomware threat landscape. Our threat hunting expert, Oleg Skulkin, will share a live demonstration of using actionable threat intelligence to respond to a human-operated ransomware attack in the first stages of its lifecycle.
Register now: https://bit.ly/3I2ESCs
Group-IB Threat Hunting Day in APAC
Join us as we explore the latest ransomware threat landscape. Our threat hunting expert, Oleg Skulkin, will share a live demonstration of using actionable threat intelligence to respond to a human-operated ransomware attack in the first stages of its lifecycle.
Register now: https://bit.ly/3I2ESCs
#AssetZero #EASM
Meet Group-IB AssetZero!
We are proud to present our new product AssetZero, an intelligence-driven attack surface management (EASM) solution. Never before has AssetZero been in greater need.
🔻As digital footprints and the complexity of IT infrastructures continue to grow, maintaining a complete and up-to-date asset inventory is becoming relevant as never before. In 2021, over 50% of Group-IB’s DFIR cases stemmed from a preventable, perimeter-based security error.
🔻Unmanaged assets that create security risks include forgotten cloud instances running vulnerable software, open ports, misconfigured databases exposed to the open web, or web servers that were deployed without being added to official asset inventories. Such assets open doors for cybercriminals.
To help companies manage these critical but avoidable flaws, we created AssetZero. It is a fully cloud-based SaaS solution designed to discover, assess, and help manage your internet-facing assets in real time via all-in-one interface.
AssetZero leverages the full breadth and depth of Group-IB’s threat hunting and intelligence gathering ecosystem by:
✅continuously discovering all external-facing IT assets
✅identifying potential vulnerabilities
✅assessing risk using Group-IB Threat Intelligence & Attribution insights
✅prioritizing issues for remediation
✅enabling measurable improvements to security posture.
Watch the video for more insights!
Meet Group-IB AssetZero!
We are proud to present our new product AssetZero, an intelligence-driven attack surface management (EASM) solution. Never before has AssetZero been in greater need.
🔻As digital footprints and the complexity of IT infrastructures continue to grow, maintaining a complete and up-to-date asset inventory is becoming relevant as never before. In 2021, over 50% of Group-IB’s DFIR cases stemmed from a preventable, perimeter-based security error.
🔻Unmanaged assets that create security risks include forgotten cloud instances running vulnerable software, open ports, misconfigured databases exposed to the open web, or web servers that were deployed without being added to official asset inventories. Such assets open doors for cybercriminals.
To help companies manage these critical but avoidable flaws, we created AssetZero. It is a fully cloud-based SaaS solution designed to discover, assess, and help manage your internet-facing assets in real time via all-in-one interface.
AssetZero leverages the full breadth and depth of Group-IB’s threat hunting and intelligence gathering ecosystem by:
✅continuously discovering all external-facing IT assets
✅identifying potential vulnerabilities
✅assessing risk using Group-IB Threat Intelligence & Attribution insights
✅prioritizing issues for remediation
✅enabling measurable improvements to security posture.
Watch the video for more insights!
Group-IB
External Attack Surface Management Solution | Group-IB Cybersecurity Products & Services
Attack Surface Management from Group-IB discovers all your external assets to uncover hidden risks like shadow IT and misconfigurations. Check it out!
👍1
Lost & Found: Discover Your External Attack Surface with AssetZero
🌏From the IPv4 space and beyond to the deep and dark web, AssetZero maps out the Internet in its entirety. In yet another key differentiator, AssetZero's findings are augmented with Group-IB cyber threat intelligence data, including malware analysis, deep & dark web activity, credential dumps, and botnet logs.
📈All of the identified assets are displayed in a graphing analysis that shows how these services and resources are interconnected, making it easy to see which assets are linked and how.
🔔After all external IT assets are discovered and inventoried, AssetZero identifies those that may be potential attack vectors, assigns a risk score to each issue, and prioritizes remediation tasks with threat intelligence insights.
All the data is available via an easy-to-use portal and dashboards that help to manage issues and prioritize risks.
🔗Check out our latest blog post to learn more about the superior capabilities of Group-IB AssetZero!
🌏From the IPv4 space and beyond to the deep and dark web, AssetZero maps out the Internet in its entirety. In yet another key differentiator, AssetZero's findings are augmented with Group-IB cyber threat intelligence data, including malware analysis, deep & dark web activity, credential dumps, and botnet logs.
📈All of the identified assets are displayed in a graphing analysis that shows how these services and resources are interconnected, making it easy to see which assets are linked and how.
🔔After all external IT assets are discovered and inventoried, AssetZero identifies those that may be potential attack vectors, assigns a risk score to each issue, and prioritizes remediation tasks with threat intelligence insights.
All the data is available via an easy-to-use portal and dashboards that help to manage issues and prioritize risks.
🔗Check out our latest blog post to learn more about the superior capabilities of Group-IB AssetZero!
🔥3👍2