1 hour 4 min, February 17, 2022

Fraud Hunting Day APAC

A discussion about the latest fraud hunting techniques, fraud used cases in APAC, possible frauds clients may face in APAC.
Pavel Shepetina, Julien Laurent, Maxim Baldakov
Request the recording
50 min, July 13, 2021

Warding off REvil: How to keep ransomware gangs out of your company

Understanding how REvil and its affiliates operate is more important than ever. Get a complete breakdown of the ransomware collective's TTPs and recommendations on how to fight it.
1 hour 10 min, April 1, 2021

Ransomware Insights 2020-2021

“Ransomware Insights 2020-2021” online event has brought together eminent experts to discuss personal experiences handling threat actors and share ransomware insights from the field.
Oleg Skulkin, Ole Villadsen, Victor Sergeev
Request the recording
33 min, March 31, 2021

Forget-me-not: Using memory analysis to search for traces of commodity malware

Commodity malware have become popular catalysts for all manner of cyberattacks, including ransomware. This webinar will give you an overview of the bots you need to know about and a first-hand look at in-memory analysis of commodity malware in action.
Svetlana Ostrovskaya
Request the recording
40 min, March 25, 2021

The ins and outs of email-borne attacks

96% of all the attacks involving social engineering techniques start in the inbox. In this webinar, take a deep dive into real-life cases and explore the evolving threats coming through email.
Rustam Mirkasymov, Pavel Shepetina
Request the recording
1 hour 20 min, 4 March 2021

Attack of the clones: Scam game in social media

Learn about scammers who use famous brands to deceive people into multistage scam schemes, including fake surveys and visiting fraudulent third-party websites. Join the webinar to know about such schemes as Rabbit Hole and Lotsy, their TTPs, detection and prevention.
1 hour 20 min, Jan 12, 2021

Digital risks 2021: Scam trends and projections

Learn about popular online scam techniques, including fake accounts and payment pages, malicious emails and data leaks, and how to properly protect yourself against them.
30 min, Des 17, 2020

Preventable Disaster: Hunting for Egregor Operators in Your Network

Learn about the latest tactics, techniques, and procedures of Egregor, the details of recent Qakbot campaigns and the similarities between Egregor, and Maze and Sekhmet. Keep your business and customers secure from all online fraud risks.
35 min, Sep 24, 2020

Outwit ProLock: The ins and outs of Qakbot’s enterprise ransomware campaigns

The year 2020 has seen a spike in Qakbot activity, and with it the emergence of campains involving the ProLock ransomware chain.
50 min, 27 Aug 2020

RedCurl: New corporate espionage group exposed

RedCurl acts covertly in the network for months to minimize the risk to be discovered. The group cleverly mimics techniques used by Red Teaming and penetration testing teams.
Rustam Mirkasymov
Request the recording
55 min, 18 Aug 2020

Leaving sandboxes behind: the rise of Malware Detonation Platforms

Learn about new tools and technologies that are used by threat actors to avoid detection in virtual environments, a typical malware analysis, how criminals’ methods have evolved.
Pavel Shepetina, Andrey Parshin
Request the recording
55 min, 16 July 2020

Scenario-based penetration testing and Security Monitoring

How Scenario-based penetration testing can help not only identify weak points in your infrastructure but check the effectiveness of the monitoring and defense mechanisms being used.
50 min, 7 July 2020

Retail Business vs. Online Scammers: The Battle Against Illegal Brand Exploitation

Supermarkets, pharmacies, and fashion retailers are just some of the businesses that have fallen victim to online scammers and that urgently need online Digital Risk Protection.
40 min, 2 July 2020

Fxmsp: The story of 1 hacker who sold access to networks

Learn more about the activity and tactics of of the threat actor known as Fxmsp, the most notorious and prolific sellers of access to corporate networks on underground forums.
Dmitry Shestakov
Request the recording
55 min, June 16, 2020

Stay one step ahead: TTPs used by ransomware groups in 2019

Ransomware attacks are on the rise and show no signs of stopping. Stay one step ahead of the enemy by learning about the tactics, techniques, and procedures they used in 2019
60 min, 11 June 2020

How to improve efficiency of your SOC

Keeping your SOC technologically and strategically relevant can be a challenge. The sophistication, speed, and volume of advanced attacks are growing, putting enterprise companies at risk.
Vladimir Golyashev
Request the recording
50 min, 27 May 2020

A Playbook of 'Perswaysion' Phishing Campaign

PerSwaysion is a highly-targeted phishing campaign. PerSwaysion appears to be a phishing kit sold on the underground markets by a Vietnamese source.
50 min, 10 April 2020

Intelligence-driven threat hunting, or don’t let the hunter become the prey

Many businesses blindly implement Threat Hunting in their infrastructures while remaining unaware of the solution that lies at the core of TH and other security processes.
Roman Rezvukhin, Oleg Skulkin
Request the recording
50 min, 31 March 2020

If I have a SOC, do I need Compromise Assessment

Can you have absolute certainty that your data and infrastructure have not been breached?
Sergey Nikitin
Request the recording
15 min, 24 March 2020

6 Symptoms of Disease: Risks for Online Pharmaceutical Market

In no other industry does the distribution of counterfeit products harm customers as much as in the pharmaceutical industry. Pharma brands must take proactive steps to protect their brands from criminals.
Pavel Suprunyuk, Anton Dolgalev
Request the recording
15 min, 18 March 2020

Open API security: Clarity instead of obscurity

APIs have become a hidden part of everyday life. Some industries are only beginning to develop their own open API ecosystems, which has made the issue of security highly relevant for them.
Pavel Suprunyuk
Request the recording
40 min, 3 March 2020

Sporting Goods Maraphon:

Official Brands vs. Counterfeiters
Anton Dolgalev, Igor Stolyarov
Request the recording
30 min, 27 February 2020

The 3 types of online fraud attack you’re most likely to face in 2020

Learn more about top-3 online fraud schemes we have detected in 2019-2020, robust online fraud prevention technologies
Pavel Shepetina
Request the recording
45 min, 20 February 2020

Detection of advanced threats. Streamlined response. Proactive Threat Hunting

Each new cyberattack aimed at a company, political party, or critical infrastructure facility gives us the opportunity to see the evolution of tactics and tools to carry them out
Pavel Shepetina
Request the recording
60 min, 6 December 2019

Hi-tech High Trend 2019/2020

A single comprehensive source of strategic data on cyberthreats and reliable forecasts of their development.
Dmitry Volkov, Nicholas Palmer
Request the recording
40 min, 14 November 2019

Online Brand Abuse:

Latest Trends and Evolution of Scam Methods
40 min, 10 Sep 2019

Are you ready for Cyber Incident Response? Expectation vs Reality

Key elements of the incident response readiness assessment designed by Group-IB. Six steps for effective incident response.
Vitaly Trifonov
Request the recording
30 min, 4 Sep 2019

Silence: Tools & Attack Evolution in 2019

This webinar is geared towards the first comprehensive technical report on the cybergang Silence.
Rustam Mirkasymov
Request the recording
30 min, 7 Jul 2019

How to level-up on your cyber knowledge: Group-IB hands-on cybersecurity programs

Learn more about Cybersecurity educational programs: Comprehensive course, Digital Hygiene,Cyber Crime Trends, SOC Building
Anastasia Barinova
Request the recording
30 min, 24 Jun 2019

How to safeguard your business from social engineering attacks?

Learn more about Social engeneering, Top social engineering attact scenarios and prevention tips
Nicholas Palmer
Request the recording
60 min, 26 Mar 2018

Incident Response Preparedness: a hard look at the statistics

In 2018 we inspected over 100 companies on preparedness for incident response and are ready to share the results of our assessment.
60 min, 29 Nov 2018

Red Team vs Pen Test

How Red Teaming is actually different from pen testing
Nicholas Palmer
Request the recording
60 min, 8 Nov 2018

Mobile Fraud Trends and Best Practices in Protecting Banking Apps

How to prevent mobile banking app fraud
Denis Maslennikov
Request the recording
60 min, 14 Sep 2018

Three Steps for Building a Successful Digital Risk Protection Strategy

Technological approach for building digital Digital Risk Protection strategy
Igor Stolyarov
Request the recording
60 min, 13 Sep 2018

New APT attacks on Banks discovered: The Sound of Silence

While successful attacks were detected in Russian banks, Group-IB experts have discovered the group’s activity in 25+ countries worldwide
Dmitry Volkov, Nicholas Palmer
Request the recording
60 min, 17 Aug 2018

How to Choose a Sandbox

Practical use cases on how to choose a sandbox and avoid common testing mistakes
Nikita Kislitsin
Request the recording
35 min, 24 May 2018

Protect your Online Banking

Learn how to detect cybercrime and attacks from client-side with technical anti-fraud
Nicholas Palmer
Request the recording
50 min, 18 December 2017

Group-IB on MoneyTaker

Cybercriminals, revealed after 1.5 years of silent operations
Nicholas Palmer, Dmitry Volkov
Request the recording
45 min, 16 November 2017

Key Findings from the Annual Report

This webinar is a year in review of cybercrime trends based on Group-IB threat intelligence data.
Nicholas Palmer, Dmitry Volkov
Request the recording
40 min, 16 August 2017

Cobalt Hacking Group Persists

Changes in attack methodology based on 20+ strategic intelligence reports with Q&A.
Nicholas Palmer, Dmitry Volkov
Request the recording
40 min, 31 May 2017

Lazarus Arisen

Architecture, Tools and Attribution of the group.
Nicholas Palmer, Dmitry Volkov
Request the recording
45 min, 19 December 2016

Cobalt ATM Jackpotting

Learn about the methods and techniques used by the criminal group and get the tips on preventing the attacks.
Nicholas Palmer, Dmitry Volkov
Request the recording

About Group-IB

Group-IB is one of the leading providers of solutions aimed at detection and prevention of cyberattacks, online fraud, and IP protection. Group-IB Threat Intelligence & Attribution system was named one of the best in class by Gartner, Forrester, and IDC.

Group-IB’s technological leadership is built on the company’s 18 years of experience in cybercrime investigations worldwide and 70,000 hours of incident response accumulated in our leading forensic laboratory and 24/7 CERT-GIB.

Group-IB actively collaborates with international partners such as INTERPOL and Europol in the fight against cybercrime, and is an industry-leading cybersecurity solutions provider.

Learn more

Our products

Group-IB’s security ecosystem provides comprehensive protection for your IT infrastructure based on our unique cyber intelligence, in-depth attack analysis, and effective incident response.

Get new report
Ransomware Uncovered 2021/2022

The well-known complete guide to the latest tactics, techniques, and procedures of ransomware operators based on MITRE ATT&CK®

Report an incident

Get 24/7 incident response assistance from our global team

APAC: +65 3159-3798
Europe: +31 20 226-90-90
EMA: +971 4 508 1605

Thank you for filling out the form! We will get back to you shortly.

We use cookies on the website to make your browser experience more personal, convenient and secure. You may block or manage the use of cookies, however, in some cases they’re essential to make this site work properly. Learn more about cookies in Group-IB Privacy And Cookies Policy.

Report an incident
Get new report Ransomware Uncovered 2021/2022