#cybersecurityblog #googletagmanager #sniffers
🔹Back in April last year our analysts first detected activities of a cybercriminal group that was subsequently dubbed GrelosGTM.
🔹In their first attacks on e-commerce websites, this group used domains, which impersonated legitimate services like Google Analytics and Google Tag Manager. One year later, in April 2021, Group-IB specialists detected that apart from using domains mimicking the services, GrelosGTM group started to abuse Google Tag Manager legitimate functionality for their own purposes in infections of online shops.
🔹Read more about their activity and our analysis in the latest blog post by Victor Okorokov, Threat Intelligence & Attribution analyst at Group-IB.
🔹Back in April last year our analysts first detected activities of a cybercriminal group that was subsequently dubbed GrelosGTM.
🔹In their first attacks on e-commerce websites, this group used domains, which impersonated legitimate services like Google Analytics and Google Tag Manager. One year later, in April 2021, Group-IB specialists detected that apart from using domains mimicking the services, GrelosGTM group started to abuse Google Tag Manager legitimate functionality for their own purposes in infections of online shops.
🔹Read more about their activity and our analysis in the latest blog post by Victor Okorokov, Threat Intelligence & Attribution analyst at Group-IB.
Group-IB
GrelosGTM group abuses Google Tag Manager to attack e-commerce websites
Group-IB specialists detected that GrelosGTM group started to abuse Google Tag Manager legitimate functionality for their own purposes in infections of online shops.
#ransomware #blog #hancitor #magecart
📊 In our new blog Oleg Skulkin (Senior Digital Forensic Analyst) and Semyon Rogachev (Malware Analyst) examine a typical Hancitor and Cuba kill chain, the threat actors’ TTPs, detailed recommendations and mitigation techniques.
🔹The Hancitor downloader has been around for quite some time already. It is known since at least 2016 for dropping Pony and Vawtrak. As a loader, it has been used to download other malware families, such as Ficker stealer and NetSupport RAT, to compromised hosts. Its operators also showed interest in post exploitation activities, deploying Cobalt Strike Beacons on the hosts located in Active Directory environments. After a few unremarkable and quiet years, Hancitor resurfaced again — it decided to join the Big Game Hunting.
🔹Group-IB Threat Intelligence & Attribution team found that Hancitor is being actively used by the threat actors to deploy Cuba ransomware. Cuba ransomware has been active since at least January 2020. Its operators have a DLS site, where they post exfiltrated data from their victims who refused to pay the ransom. As of April 28, the site mentioned nine primarily companies from aviation, financial, education and manufacturing industries.
📊 In our new blog Oleg Skulkin (Senior Digital Forensic Analyst) and Semyon Rogachev (Malware Analyst) examine a typical Hancitor and Cuba kill chain, the threat actors’ TTPs, detailed recommendations and mitigation techniques.
🔹The Hancitor downloader has been around for quite some time already. It is known since at least 2016 for dropping Pony and Vawtrak. As a loader, it has been used to download other malware families, such as Ficker stealer and NetSupport RAT, to compromised hosts. Its operators also showed interest in post exploitation activities, deploying Cobalt Strike Beacons on the hosts located in Active Directory environments. After a few unremarkable and quiet years, Hancitor resurfaced again — it decided to join the Big Game Hunting.
🔹Group-IB Threat Intelligence & Attribution team found that Hancitor is being actively used by the threat actors to deploy Cuba ransomware. Cuba ransomware has been active since at least January 2020. Its operators have a DLS site, where they post exfiltrated data from their victims who refused to pay the ransom. As of April 28, the site mentioned nine primarily companies from aviation, financial, education and manufacturing industries.
Group-IB
Connecting the Bots
The blog post examines a typical Hancitor and Cuba kill chain, the threat actors' TTPs, detailed recommendations, and mitigation techniques.
#sbr #award #gib_tia
Group-IB wins SBR Technology Excellence 2021 award for Threat Intelligence & Attribution system 🏆
🔹 The SBR Technology Excellence Award 2021 honors companies in Singapore that are riding the digital disruption wave and leading the state’s technological revolution.
🔹 “Winning the SBR Technology Excellence Awards 2021 is a proud moment for the developers of Group-IB TI&A system, our threat intelligence analysts and the company in general,” comments Group-IB head of Sales and Global Development in APAC Shafique Dawood. “Group-IB’s TI&A is the core element of our smart ecosystem of cybersecurity products uniting the company’s patented technologies. It enriches with data other parts of Group-IB’s global threat hunting ecosystem and constantly draws data from them. The use of TI&A along with our other products in the customer infrastructure has a synergistic effect in terms of cybersecurity and offers infinite opportunities for research into various types of cybersecurity incidents, including in OT networks, to give the impetus to Industry 4.0.”
🔹 Group-IB’s Threat Intelligence & Attribution is a solution intended for creating organization-tailored threat landscape, analyzing and attributing cyberattacks and proactive threat hunting both within and outside the protected perimeter. Trusted by banks and financial organizations, telecom and FMCG companies in over 60 countries of the world, Group-IB TI&A identifies insiders and data leaks before damage can be done, analyzes threats and enriches IOCs obtained through other systems with context, and at the same time educates and improves the efficiency of corporate security teams.
🔹 One of the most innovative technologies embedded in TI&A is graph network analysis, which once used to be an internal tool of Group-IB Threat Intelligence analysts. It automatically correlates separate events, building links between them and attributing attacks to a particular cybercriminal group just in seconds.
Group-IB wins SBR Technology Excellence 2021 award for Threat Intelligence & Attribution system 🏆
🔹 The SBR Technology Excellence Award 2021 honors companies in Singapore that are riding the digital disruption wave and leading the state’s technological revolution.
🔹 “Winning the SBR Technology Excellence Awards 2021 is a proud moment for the developers of Group-IB TI&A system, our threat intelligence analysts and the company in general,” comments Group-IB head of Sales and Global Development in APAC Shafique Dawood. “Group-IB’s TI&A is the core element of our smart ecosystem of cybersecurity products uniting the company’s patented technologies. It enriches with data other parts of Group-IB’s global threat hunting ecosystem and constantly draws data from them. The use of TI&A along with our other products in the customer infrastructure has a synergistic effect in terms of cybersecurity and offers infinite opportunities for research into various types of cybersecurity incidents, including in OT networks, to give the impetus to Industry 4.0.”
🔹 Group-IB’s Threat Intelligence & Attribution is a solution intended for creating organization-tailored threat landscape, analyzing and attributing cyberattacks and proactive threat hunting both within and outside the protected perimeter. Trusted by banks and financial organizations, telecom and FMCG companies in over 60 countries of the world, Group-IB TI&A identifies insiders and data leaks before damage can be done, analyzes threats and enriches IOCs obtained through other systems with context, and at the same time educates and improves the efficiency of corporate security teams.
🔹 One of the most innovative technologies embedded in TI&A is graph network analysis, which once used to be an internal tool of Group-IB Threat Intelligence analysts. It automatically correlates separate events, building links between them and attributing attacks to a particular cybercriminal group just in seconds.
#virtualvendors #partners
Group-IB teams up with Virtual Vendors in Australia and New Zealand to deliver local companies rock solid cyber defense.
🤝Group-IB has signed a partnership agreement with Virtual Vendors, an Australia based cyber security advisory company. The two companies aim to join forces to connect local business and government organizations to Group-IB’s products and services trusted by the world’s biggest financial, energy, telecommunications, eCommerce companies, and enterprises amid growing frequency and sophistication of cyberattacks on IT and OT networks.
📊According to the Australian Cyber Security Centre (ACSC), an average of 164 cybercrime reports are made by Australians every day. Banking trojans and ransomware groups are increasingly active in the region. As stated in the Hi-Tech Crime Trends Report 2020-21, Australia is one of the most favorite targets of infamous ransomware gangs, such as REvil and Ryuk. Cybercriminals are also actively interested in payment cards issued by the local banks: Australia is in the top-10 countries in the world by the number of card dumps traded on the underground marketplaces, as per the report.
⏫Thanks to the partnership between Virtual Vendors and Group-IB, local financial sector, eCommerce, telecommunications, industrial companies and government institutions can now leverage Group-IB full suite of battle-tested Cyber Threat Intelligence & Attribution, Threat Hunting, Fraud Hunting, and Digital Risk Protection technologies.
☑️Group-IB smart cybersecurity ecosystem uniting Group-IB’s patented innovative technologies will help regional cybersecurity teams consolidate, prioritize, and make informed decisions on relevant threats posed to their organization.
Group-IB teams up with Virtual Vendors in Australia and New Zealand to deliver local companies rock solid cyber defense.
🤝Group-IB has signed a partnership agreement with Virtual Vendors, an Australia based cyber security advisory company. The two companies aim to join forces to connect local business and government organizations to Group-IB’s products and services trusted by the world’s biggest financial, energy, telecommunications, eCommerce companies, and enterprises amid growing frequency and sophistication of cyberattacks on IT and OT networks.
📊According to the Australian Cyber Security Centre (ACSC), an average of 164 cybercrime reports are made by Australians every day. Banking trojans and ransomware groups are increasingly active in the region. As stated in the Hi-Tech Crime Trends Report 2020-21, Australia is one of the most favorite targets of infamous ransomware gangs, such as REvil and Ryuk. Cybercriminals are also actively interested in payment cards issued by the local banks: Australia is in the top-10 countries in the world by the number of card dumps traded on the underground marketplaces, as per the report.
⏫Thanks to the partnership between Virtual Vendors and Group-IB, local financial sector, eCommerce, telecommunications, industrial companies and government institutions can now leverage Group-IB full suite of battle-tested Cyber Threat Intelligence & Attribution, Threat Hunting, Fraud Hunting, and Digital Risk Protection technologies.
☑️Group-IB smart cybersecurity ecosystem uniting Group-IB’s patented innovative technologies will help regional cybersecurity teams consolidate, prioritize, and make informed decisions on relevant threats posed to their organization.
Group-IB
Group-IB teams up with Virtual Vendors in Australia and New Zealand to deliver local companies rock solid cyber defense
Group-IB, a global threat hunting and adversary-centric cyber intelligence company, has signed a partnership agreement with Virtual Vendors, an Australia based cyber security advisory company. The two companies aim to join forces to connect local business…
#socialengineering #pentesting
How to Attack Yourself Better in 2021
Pavel Suprunyuk, Deputy Head of Audit & Consulting Department at Group-IB, published an article for Dark Reading about social engineering pen testing and what the typical cybersecurity training misses.
➡️ It's not a matter of if — it's when an employee will receive that "urgent" email or call asking them to transfer money to a safe place, log in to your corporate network, or install a remote access Trojan. Social engineering has always been a sure-fire way for cybercriminals to ensure a high success rate. But the pandemic-driven increase in remote work turned social engineering techniques into a tool of limitless creativity and prosperity like never before.
➡️ When working from home, employees don't have the full-scale protection offered by corporate security solutions and must instead rely on their gut feeling, which is a cybersecurity team's worst nightmare. After realizing the scale of the catastrophe, many companies have rushed to educate their employees. To assess the scope of the problem, Group-IB carried out a social engineering penetration testing project in a logistics company. The test used a pretext related to COVID-19 and demonstrated employees' unrelenting interest in the matter. It used a well-crafted phishing email sent from a fake email address supposedly belonging to the company's IT department. More than half (51%) of the test subjects submitted their credentials on the fake VPN portal login page.
Check out the article for the full analysis!
How to Attack Yourself Better in 2021
Pavel Suprunyuk, Deputy Head of Audit & Consulting Department at Group-IB, published an article for Dark Reading about social engineering pen testing and what the typical cybersecurity training misses.
➡️ It's not a matter of if — it's when an employee will receive that "urgent" email or call asking them to transfer money to a safe place, log in to your corporate network, or install a remote access Trojan. Social engineering has always been a sure-fire way for cybercriminals to ensure a high success rate. But the pandemic-driven increase in remote work turned social engineering techniques into a tool of limitless creativity and prosperity like never before.
➡️ When working from home, employees don't have the full-scale protection offered by corporate security solutions and must instead rely on their gut feeling, which is a cybersecurity team's worst nightmare. After realizing the scale of the catastrophe, many companies have rushed to educate their employees. To assess the scope of the problem, Group-IB carried out a social engineering penetration testing project in a logistics company. The test used a pretext related to COVID-19 and demonstrated employees' unrelenting interest in the matter. It used a well-crafted phishing email sent from a fake email address supposedly belonging to the company's IT department. More than half (51%) of the test subjects submitted their credentials on the fake VPN portal login page.
Check out the article for the full analysis!
Dark Reading
How to Attack Yourself Better in 2021
Social engineering pen testing is just one step in preventing employees from falling victim to cybercriminals.
#Ransomware #myths
Ransomware and some of the common misconceptions
With ransomware becoming a bigger threat with every passing year, a large number of related myths are starting to surface. Today, we’ll try to take a closer look into the most common misconceptions:
1️⃣ Ransomware operators’ main goal is sabotage.
Some of us mistakenly assume ransomware attacks are carried out to inflict maximum damage on the company, however financial gain is cybercriminals’ dominant motivation.Generally, the attack is always followed by a ransom demand to restore the encrypted data.
2️⃣ Ransomware operators are attacking literally everyone.
Unfortunately every one of us can become a victim, however threat actors prefer focusing on big and established companies as they are in a position to pay a large ransom.
3️⃣ Victim is guaranteed to get the restored data after paying a ransom.
Not every cybercriminal sticks to the word. Just around half of the victims who pay the ransom receive a decryption key, and only half of that portion actually manage to successfully restore their data.
4️⃣ Antivirus provides substantial protection.
This is, yet again, an opinion many of us stick to. In reality though cybercriminals have long ago learned how to get through the most widely used protection solutions. To put it simply, your antivirus cannot serve as the only ransomware protection measure.
5️⃣ Ransomware only works on Windows.
Sure, in raw numbers attacks affect Windows devices considerably more often. The explanation though is quite simple. Apple computers are far behind Windows PCs and laptops in terms of the market share. A dedicated Mac malware requires extra time and effort to put together. Many cybercriminals just don’t think it is worth it. However, Apple oriented ransomware does inflict considerable damage on a regular basis. To sum up, even if you and your company use Apple devices exclusively, you are still under threat.
6️⃣ You’re totally safe if you have a backup.
Sadly ransomware often encrypts your backups too. While nice to have, they cannot be solely relied on to counter an attack.
Would you like to know more about ransomware as well as tactics, techniques and procedures used by their operators over the last year? Our comprehensive report, Ransomware Uncovered 2020/2021, has all of the above covered in detail!
Ransomware and some of the common misconceptions
With ransomware becoming a bigger threat with every passing year, a large number of related myths are starting to surface. Today, we’ll try to take a closer look into the most common misconceptions:
1️⃣ Ransomware operators’ main goal is sabotage.
Some of us mistakenly assume ransomware attacks are carried out to inflict maximum damage on the company, however financial gain is cybercriminals’ dominant motivation.Generally, the attack is always followed by a ransom demand to restore the encrypted data.
2️⃣ Ransomware operators are attacking literally everyone.
Unfortunately every one of us can become a victim, however threat actors prefer focusing on big and established companies as they are in a position to pay a large ransom.
3️⃣ Victim is guaranteed to get the restored data after paying a ransom.
Not every cybercriminal sticks to the word. Just around half of the victims who pay the ransom receive a decryption key, and only half of that portion actually manage to successfully restore their data.
4️⃣ Antivirus provides substantial protection.
This is, yet again, an opinion many of us stick to. In reality though cybercriminals have long ago learned how to get through the most widely used protection solutions. To put it simply, your antivirus cannot serve as the only ransomware protection measure.
5️⃣ Ransomware only works on Windows.
Sure, in raw numbers attacks affect Windows devices considerably more often. The explanation though is quite simple. Apple computers are far behind Windows PCs and laptops in terms of the market share. A dedicated Mac malware requires extra time and effort to put together. Many cybercriminals just don’t think it is worth it. However, Apple oriented ransomware does inflict considerable damage on a regular basis. To sum up, even if you and your company use Apple devices exclusively, you are still under threat.
6️⃣ You’re totally safe if you have a backup.
Sadly ransomware often encrypts your backups too. While nice to have, they cannot be solely relied on to counter an attack.
Would you like to know more about ransomware as well as tactics, techniques and procedures used by their operators over the last year? Our comprehensive report, Ransomware Uncovered 2020/2021, has all of the above covered in detail!
Group-IB
Research Hub
Deep dives on previously unknown APTs, insights into the most recent cybersecurity trends and technologies, and predictions and recommendations that can help shape your security strategy.
#phishing #bots
Telegram bots and Google Forms make an appearance in phishing schemes
🐠A phishing kit is a toolset that helps create and operate phishing web pages that mimic a specific company or even several at once. They are usually sold on underground forums and are a way to effortlessly build infrastructure for large-scale phishing campaigns. By extracting the kits, cybersecurity analysts can identify the mechanism used to carry out the phishing attack and figure out where the stolen data is sent. In addition, a thorough examination of phishing kits helps analysts detect digital traces that might lead to the developers of the phishing kit.
🐠Group-IB specialists found that cybercriminals are beginning to use legitimate services such as Google Forms and Telegram to obtain user data stolen on phishing websites. This approach is a more safe solution and allows criminals to get the information immediately as opposed to previously using more complex tools such as dedicated e-mail accounts where one would first log in to obtain the data.
🐠In addition, ready-to-go platforms that automate phishing and which are available on the darknet have Telegram bots at their core, with admin panel that is used to manage the entire process of the phishing attack and keep financial records linked to them. Such platforms are distributed under the cybercrime-as-a-service model, which subsequently leads to more groups conducting attacks. They also widen the scope of cybercriminal activity.
Check out the full story on our website if you are curious to dive into our analysis and learn about the ways to protect your business from phishing attacks.
Telegram bots and Google Forms make an appearance in phishing schemes
🐠A phishing kit is a toolset that helps create and operate phishing web pages that mimic a specific company or even several at once. They are usually sold on underground forums and are a way to effortlessly build infrastructure for large-scale phishing campaigns. By extracting the kits, cybersecurity analysts can identify the mechanism used to carry out the phishing attack and figure out where the stolen data is sent. In addition, a thorough examination of phishing kits helps analysts detect digital traces that might lead to the developers of the phishing kit.
🐠Group-IB specialists found that cybercriminals are beginning to use legitimate services such as Google Forms and Telegram to obtain user data stolen on phishing websites. This approach is a more safe solution and allows criminals to get the information immediately as opposed to previously using more complex tools such as dedicated e-mail accounts where one would first log in to obtain the data.
🐠In addition, ready-to-go platforms that automate phishing and which are available on the darknet have Telegram bots at their core, with admin panel that is used to manage the entire process of the phishing attack and keep financial records linked to them. Such platforms are distributed under the cybercrime-as-a-service model, which subsequently leads to more groups conducting attacks. They also widen the scope of cybercriminal activity.
Check out the full story on our website if you are curious to dive into our analysis and learn about the ways to protect your business from phishing attacks.
Group-IB
Send to saved messages: cybercriminals use Telegram bots and Google Forms to automate phishing | Group-IB
Group-IB, a global threat hunting and adversary-centric cyber intelligence company, has found that cybercriminals increasingly often use legitimate services such as Google Forms and Telegram to obtain user data stolen during phishing attacks. Alternative…
#GIB_THF #HelpNetSecurity
Threat Hunting Framework: Help Net Security Review
🔹Help Net Security reviewed and tested our Threat Hunting Framework and published their conclusions in their new article.
🔹Make sure to give it a read if you are curious to know more about the testing process, framework’s components and the ultimate conclusion.
🔹Group-IB Threat Hunting Framework is a system for IT and OT networks that protects against unknown threats and targeted attacks, hunts for threats both within and outside the protected organization’s perimeter, and helps investigate and respond to cybersecurity incidents and minimize their impact.
Threat Hunting Framework: Help Net Security Review
🔹Help Net Security reviewed and tested our Threat Hunting Framework and published their conclusions in their new article.
🔹Make sure to give it a read if you are curious to know more about the testing process, framework’s components and the ultimate conclusion.
🔹Group-IB Threat Hunting Framework is a system for IT and OT networks that protects against unknown threats and targeted attacks, hunts for threats both within and outside the protected organization’s perimeter, and helps investigate and respond to cybersecurity incidents and minimize their impact.
Group-IB
Managed detection and response | Cybersecurity Products & Services - Group-IB
Group-IB Managed XDR uses EDR, NTA, Sandbox and email protection technologies to detect and disrupt malicious activity. Check out our services!
#education #daltonschool #amsterdam
Group-IB European team shares the cybersecurity basics and valuable tips with school students in Amsterdam!
🎓Dalton schools are becoming more popular around the world these days, but what exactly are they all about? Generally speaking, students bear a high level of independence as well as responsibility. Rather than constantly monitoring their progress, teachers simply outline a deadline for a project or an assignment. They can act as coaches, providing guidance upon request, but they never interfere before the deadline unless asked to do so. This is very similar to what many of us experience at work and it’s a great way to prepare for an adult life!
🏡Located in the Nieuw-West district of Amsterdam, Caland Lyceum is a perfect example of a Dalton School.
👨💼Our team, lead by Artyom Artyomov, Head of Digital Forensics Laboratory in Europe, gladly accepted the invitation to stop by for a lecture. Artyom touched down on a number of interesting topics such as
🔹cybercrime
🔹current threats
🔹how to protect yourself online
🔹what exactly is digital forensics
We knew we ended up in the right place straight away! All of the students were extremely interested in cybersecurity and closely listened to Artyom for more than an hour. This was followed by a series of straight-to-the point questions, including:
🔹how did Artyom end up in cybersecurity
🔹what’s the biggest case in his career
🔹how to protect yourself online when using a phone
🔹how effective antiviruses are these days
🔹what are the latest and most effective solutions to protect yourself from cybercriminals
💪We were very happy to encounter an audience so passionate about the topics we brought in and expand their knowledge on cybersecurity!
🌎Group-IB is excited to keep participating in education projects around the world, improving our common digital environment.
Group-IB European team shares the cybersecurity basics and valuable tips with school students in Amsterdam!
🎓Dalton schools are becoming more popular around the world these days, but what exactly are they all about? Generally speaking, students bear a high level of independence as well as responsibility. Rather than constantly monitoring their progress, teachers simply outline a deadline for a project or an assignment. They can act as coaches, providing guidance upon request, but they never interfere before the deadline unless asked to do so. This is very similar to what many of us experience at work and it’s a great way to prepare for an adult life!
🏡Located in the Nieuw-West district of Amsterdam, Caland Lyceum is a perfect example of a Dalton School.
👨💼Our team, lead by Artyom Artyomov, Head of Digital Forensics Laboratory in Europe, gladly accepted the invitation to stop by for a lecture. Artyom touched down on a number of interesting topics such as
🔹cybercrime
🔹current threats
🔹how to protect yourself online
🔹what exactly is digital forensics
We knew we ended up in the right place straight away! All of the students were extremely interested in cybersecurity and closely listened to Artyom for more than an hour. This was followed by a series of straight-to-the point questions, including:
🔹how did Artyom end up in cybersecurity
🔹what’s the biggest case in his career
🔹how to protect yourself online when using a phone
🔹how effective antiviruses are these days
🔹what are the latest and most effective solutions to protect yourself from cybercriminals
💪We were very happy to encounter an audience so passionate about the topics we brought in and expand their knowledge on cybersecurity!
🌎Group-IB is excited to keep participating in education projects around the world, improving our common digital environment.
#interview #award #sbr
An exclusive interview with Shafique Dawood, Group-IB Head of Sales and Business Development in APAC.
Last month, we were very excited and honored to receive the SBR Technology Excellence 2021 award for our Threat Intelligence & Attribution system. Shafique Dawood, Group-IB Head of Sales and Business Development in APAC was proud to accept the award in person as well as stop by for an interview discussing:
🔹What exactly is our Threat Intelligence & Attribution system and its distinguishing features
🔹What threats business can counter with the help of our Threat Intelligence & Attribution system
🔹Some of the international counter cybercrime operations Group-IB took part in
🔹Ransomware and how Group-IB expertise can play a vital role in countering the modern plague
Click here for more information about Group-IB Threat Intelligence & Attribution!
An exclusive interview with Shafique Dawood, Group-IB Head of Sales and Business Development in APAC.
Last month, we were very excited and honored to receive the SBR Technology Excellence 2021 award for our Threat Intelligence & Attribution system. Shafique Dawood, Group-IB Head of Sales and Business Development in APAC was proud to accept the award in person as well as stop by for an interview discussing:
🔹What exactly is our Threat Intelligence & Attribution system and its distinguishing features
🔹What threats business can counter with the help of our Threat Intelligence & Attribution system
🔹Some of the international counter cybercrime operations Group-IB took part in
🔹Ransomware and how Group-IB expertise can play a vital role in countering the modern plague
Click here for more information about Group-IB Threat Intelligence & Attribution!
YouTube
Group-IB wins SBR Technology Excellence 2021 award for Threat Intelligence & Attribution system
An exclusive interview with Shafique Dawood, Group-IB Head of Sales and Business Development in APAC.
Last month we were very excited and honored to receive the SBR Technology Excellence 2021 award for our Threat Intelligence & Attribution system. Shafique…
Last month we were very excited and honored to receive the SBR Technology Excellence 2021 award for our Threat Intelligence & Attribution system. Shafique…

