Get 24/7 incident response assistance from our global team
- APAC: +65 3159 4398
- EU & NA: +31 20 890 55 59
- MEA: +971 4 540 6400
- LATAM: +56 2 275 473 79
Get 24/7 incident response assistance from our global team
Please review the following rules before submitting your application:
1. Our main objective is to foster a community of like-minded individuals dedicated to combatting cybercrime and who have never engaged in Blackhat activities.
2. All applications must include research or a research draft. You can find content criteria in the blog. Please provide a link to your research or research draft using the form below.
A weekly briefing from our analysts: current threats, active adversaries, real incident tactics, and what to do next, delivered with regional context.

Introducing Cyber Fraud Intelligence Platform, the first real-time, GDPR-compliant fraud intelligence sharing solution of its kind.

Our latest threat research report is live: UNC2891: ATM Threats Never Die. Since 2022, Group-IB specialists have been tracking this low-profile, financially motivated group targeting financial institutions.

Ransomware groups including Payouts King, Arachna Leak, and Qilin targeted organizations in financial services, healthcare, and manufacturing.

Our latest investigation exposes a professional phishing framework impersonating Aruba S.p.A., Italy’s major IT and web services provider.
You’ll get a snapshot of active campaigns, IOCs, and technique changes, along with the most likely next moves. Use this to prioritize hunts and adjust detections the same day.
Each issue includes short analyses of new attack paths (for example, OTP interception, PhaaS kits, and initial access trends). We explain what to look for, why it matters, and where to instrument.
You receive concise notes for CISOs that translate threat trends into priorities, roadmaps, and control trade-offs. These summaries help you frame budget asks and sequence investments.
We highlight new Group-IB reports, webinars, and briefs with clear, actionable takeaways. You also get early access links and summaries to share with stakeholders.
We provide detection logic, response tips, and validation steps tailored for SOC and IR. You can copy, adapt, and run these to reduce MTTR and cut false positives.