<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	  xmlns:content="http://purl.org/rss/1.0/modules/content/"
	  xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	  xmlns:dc="http://purl.org/dc/elements/1.1/"
	  xmlns:atom="http://www.w3.org/2005/Atom"
	  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	  xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	  >
	<channel>
	  <title>Group-IB Blog</title>
	  <link>https://www.group-ib.com/blog/</link>
	  <description>Exponentiate your cybersecurity expertise and stay up to date with the latest cyber threat trends covered in our blog.</description>
	  <lastBuildDate>Thu, 23 Apr 2026 18:36:00</lastBuildDate>
	  <language></language>
	  <sy:updatePeriod>hourly</sy:updatePeriod>
	  <sy:updateFrequency>1</sy:updateFrequency>
	        <item>
        <title>Anatomy of a Fraud Operation: Mule Account Creation on B2B Fintech Platforms in France</title>
        <link>https://www.group-ib.com/blog/french-fintech-mule-accounts/</link>
        <description>How corporate/retail accounts are exploited for financial fraud through sophisticated device fingerprinting and mule networks.</description>        <pubDate>Wed, 22 Apr 2026 06:53:46</pubDate>
        <guid>https://www.group-ib.com/blog/french-fintech-mule-accounts/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-33.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>W3LL Unmasked</title>
        <link>https://www.group-ib.com/blog/w3ll-phishing-ecosystem-takedown/</link>
        <description>The takedown of a global phishing-as-a-service ecosystem</description>        <pubDate>Thu, 16 Apr 2026 06:56:10</pubDate>
        <guid>https://www.group-ib.com/blog/w3ll-phishing-ecosystem-takedown/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-34.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Seven Signals Cyber Experts Agreed on at FIRST Paris 2026</title>
        <link>https://www.group-ib.com/blog/seven-cyber-signals-first-paris-2026/</link>
        <description>Group-IB hosted the FIRST Technical Colloquium in Paris, where cybersecurity experts challenged assumptions around modern cyber defense. FIRST Chair Olivier Caleff opened and moderated the event.</description>        <pubDate>Thu, 09 Apr 2026 09:25:15</pubDate>
        <guid>https://www.group-ib.com/blog/seven-cyber-signals-first-paris-2026/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-31.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Are Risks Revealed in Actions or Activity? Understanding Behavioral Analytics in Cybersecurity</title>
        <link>https://www.group-ib.com/blog/behavioral-analytics-cybersecurity/</link>
        <description>Attackers count on static defenses. Switch to advanced behavioral analytics to spot abnormal behavior while its still unfolding and protect your environment.</description>        <pubDate>Thu, 09 Apr 2026 08:16:00</pubDate>
        <guid>https://www.group-ib.com/blog/behavioral-analytics-cybersecurity/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-30.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Cyber Saga: In the Footsteps of the DPRK IT Workers</title>
        <link>https://www.group-ib.com/blog/dprk-fake-remote-developers/</link>
        <description>Discover how North Korean threat actors use synthetic identities, AI-assisted workflows, and overlapping infrastructure to infiltrate companies, and learn actionable strategies to mitigate this insider threat.</description>        <pubDate>Wed, 08 Apr 2026 07:30:00</pubDate>
        <guid>https://www.group-ib.com/blog/dprk-fake-remote-developers/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-32.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Hooking the Archipelago: Dissecting a Phishing Campaign Targeting Philippine Banking Users</title>
        <link>https://www.group-ib.com/blog/phisles-phishing-banks-philippines/</link>
        <description>Group-IB researchers uncover an ongoing phishing campaign targeting major banks in the Philippines. This blog details how threat actors abuse trusted and legitimate platforms to deceive users and evade detection. It highlights a significant threat escalation with the successful hijacking of a legitimate domain to host malicious infrastructure, enabling threat actors to operate with even greater credibility and reduced detection.</description>        <pubDate>Wed, 01 Apr 2026 10:32:35</pubDate>
        <guid>https://www.group-ib.com/blog/phisles-phishing-banks-philippines/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-29.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Phantom Stealer: Credential Theft as a Service</title>
        <link>https://www.group-ib.com/blog/phantom-stealer-credential-theft/</link>
        <description>Group-IB shows how Business Email Protection blocked Phantom Stealer phishing emails across different campaign waves.</description>        <pubDate>Tue, 31 Mar 2026 06:56:08</pubDate>
        <guid>https://www.group-ib.com/blog/phantom-stealer-credential-theft/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-28.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Beyond Compliance: How Financial Institutions Can Meet New Fraud-Sharing Mandates While Respecting Privacy</title>
        <link>https://www.group-ib.com/blog/beyond-compliance-fraud-sharing-privacy/</link>
        <description>Global regulators are mandating fraud intelligence sharing. Learn how financial institutions can collaborate in real-time while maintaining privacy compliance through Distributed Tokenization.</description>        <pubDate>Mon, 30 Mar 2026 15:25:57</pubDate>
        <guid>https://www.group-ib.com/blog/beyond-compliance-fraud-sharing-privacy/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/site-thumbnail_300h300.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Cybersecurity Strategy Planning:  The Essential Reset for Security Teams and Leaders in 2026</title>
        <link>https://www.group-ib.com/blog/cybersecurity-strategy-planning-2026/</link>
        <description>Is your cybersecurity truly built to withstand today’s nuanced threats or is it just living on paper? Find out more.</description>        <pubDate>Mon, 30 Mar 2026 08:20:46</pubDate>
        <guid>https://www.group-ib.com/blog/cybersecurity-strategy-planning-2026/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-26.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Esquema de Phishing GTFire: Evitando la detección mediante servicios de Google</title>
        <link>https://www.group-ib.com/blog/gtfire-phishing-scheme-es/</link>
        <description>Cómo GTFire abusa de Google Firebase y Google Translate para escalar campañas globales de phishing</description>        <pubDate>Wed, 25 Mar 2026 12:13:42</pubDate>
        <guid>https://www.group-ib.com/blog/gtfire-phishing-scheme-es/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-24.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Cloud Phones: The Invisible Threat</title>
        <link>https://www.group-ib.com/blog/cloud-phones-invisible-threat/</link>
        <description>Tracing the evolution of cloud phone technology from harmless social media engagement automation to industrial-scale financial fraud that’s invisible to modern detection systems.</description>        <pubDate>Wed, 25 Mar 2026 07:09:44</pubDate>
        <guid>https://www.group-ib.com/blog/cloud-phones-invisible-threat/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-25.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Hasta la vista, Hastalamuerte: An Overview of The Gentlemen&#8217;s TTPs</title>
        <link>https://www.group-ib.com/blog/hastalamuerte-gentlemen-raas-ttps/</link>
        <description>The report provides an overview on tactics, techniques, and procedures (TTPs) of The Gentlemen observed by Group-IB in intrusions conducted by its affiliates, as well as relevant information about the group's capabilities collected from underground private sources.</description>        <pubDate>Thu, 19 Mar 2026 07:09:19</pubDate>
        <guid>https://www.group-ib.com/blog/hastalamuerte-gentlemen-raas-ttps/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/the-gentlemen-thumbnail-300-x300.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>The Rise of Fake Shipment Tracking Scams in MEA</title>
        <link>https://www.group-ib.com/blog/mea-shipment-tracking-scam/</link>
        <description>Did you really lose your shipment on the way?</description>        <pubDate>Fri, 13 Mar 2026 16:18:47</pubDate>
        <guid>https://www.group-ib.com/blog/mea-shipment-tracking-scam/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-22.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Six Supply Chain Attack Groups to Watch Out for in 2026</title>
        <link>https://www.group-ib.com/blog/supply-chain-attack-groups-2026/</link>
        <description>Who's attacking your vendors? Read about the six main supply chain attack groups who are driving SaaS, open-source, and MSP compromise in 2026. Learn how npm supply chain attacks threaten your security today, based on threat intelligence collected by Group-IB.</description>        <pubDate>Fri, 13 Mar 2026 10:55:43</pubDate>
        <guid>https://www.group-ib.com/blog/supply-chain-attack-groups-2026/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-21.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>GTFire Phishing Scheme: Avoiding Detection Using Google Services</title>
        <link>https://www.group-ib.com/blog/gtfire-phishing-scheme/</link>
        <description>How GTFire abuses Google Firebase and Google Translate to scale global phishing campaigns</description>        <pubDate>Thu, 26 Feb 2026 07:55:28</pubDate>
        <guid>https://www.group-ib.com/blog/gtfire-phishing-scheme/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-20.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Operation Olalampo: Inside MuddyWater’s Latest Campaign</title>
        <link>https://www.group-ib.com/blog/muddywater-operation-olalampo/</link>
        <description>MuddyWater APT has launched a new cyber offensive operation, dubbed Operation Olalampo, deploying new malware variants and leveraging Telegram bots for command-and-control. Analysis of the campaign provides a glimpse into the group’s post-exploitation tactics, which largely align with their  historical operations.</description>        <pubDate>Fri, 20 Feb 2026 10:09:20</pubDate>
        <guid>https://www.group-ib.com/blog/muddywater-operation-olalampo/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-18.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Beyond Tax Returns: How Shared Malware Infrastructure Scales Brand Abuse In Indonesia</title>
        <link>https://www.group-ib.com/blog/indonesia-tax-impersonation-goldfactory-malware/</link>
        <description>It’s tax season in Indonesia and fraudsters are observed to be ramping up the fraud campaign involving fake Coretax apps, but behind it lies an industrialized MaaS infrastructure ready to strike anywhere.</description>        <pubDate>Thu, 19 Feb 2026 10:29:34</pubDate>
        <guid>https://www.group-ib.com/blog/indonesia-tax-impersonation-goldfactory-malware/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-19.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Shaping Shadows: Breaking Down New ShadowSyndicate Methods and Infrastructure</title>
        <link>https://www.group-ib.com/blog/new-shadowsyndicate-infrastructure/</link>
        <description>ShadowSyndicate levels up by developing new tactics, establishing additional SSH fingerprints and involving more servers.</description>        <pubDate>Wed, 04 Feb 2026 07:11:24</pubDate>
        <guid>https://www.group-ib.com/blog/new-shadowsyndicate-infrastructure/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-17.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>AI, Explain Yourself: Why Is Explainable AI (XAI) Becoming Critical for Cybersecurity?</title>
        <link>https://www.group-ib.com/blog/xai-cybersecurity/</link>
        <description>AI knows everything, but should we trust it blindly? Here’s where XAI becomes important, by helping to keep AI in check and maintaining transparency, trust, and a true risk picture in cybersecurity.</description>        <pubDate>Tue, 03 Feb 2026 06:01:31</pubDate>
        <guid>https://www.group-ib.com/blog/xai-cybersecurity/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-16.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Your Cloud(s). Adversaries&#8217; Chance At Control</title>
        <link>https://www.group-ib.com/blog/multicloud-cspm-security/</link>
        <description>Reconfigure multi-cloud security with the newly launched Group-IB Cloud Security Posture Management (CSPM)</description>        <pubDate>Tue, 27 Jan 2026 09:37:18</pubDate>
        <guid>https://www.group-ib.com/blog/multicloud-cspm-security/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-13.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Peruvian Peaks: The Digital Loan Illusion</title>
        <link>https://www.group-ib.com/blog/peru-digital-loan-scam/</link>
        <description>A deep dive into loan phishing scams in Peru and Latin America. Discover how scammers lure victims with fake loan offers, harvest sensitive banking credentials, and leverage advanced scripts to maximize fraud at scale.</description>        <pubDate>Wed, 21 Jan 2026 06:56:48</pubDate>
        <guid>https://www.group-ib.com/blog/peru-digital-loan-scam/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail-300x300-1-1.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Top 5 AI Security Risks in 2026</title>
        <link>https://www.group-ib.com/blog/ai-security-risks/</link>
                <pubDate>Tue, 20 Jan 2026 06:27:04</pubDate>
        <guid>https://www.group-ib.com/blog/ai-security-risks/</guid>
        <enclosure url="" type="image/jpeg"/>
      </item>
	        <item>
        <title>Phishing &#038; Email Security: An AI-Ready Playbook</title>
        <link>https://www.group-ib.com/blog/phishing-email-security/</link>
                <pubDate>Tue, 20 Jan 2026 06:12:09</pubDate>
        <guid>https://www.group-ib.com/blog/phishing-email-security/</guid>
        <enclosure url="" type="image/jpeg"/>
      </item>
	        <item>
        <title>Real-World Examples of AI in Cybersecurity</title>
        <link>https://www.group-ib.com/blog/examples-of-ai-in-cybersecurity/</link>
                <pubDate>Tue, 20 Jan 2026 05:59:02</pubDate>
        <guid>https://www.group-ib.com/blog/examples-of-ai-in-cybersecurity/</guid>
        <enclosure url="" type="image/jpeg"/>
      </item>
	        <item>
        <title>DeadLock Ransomware: Smart Contracts for Malicious Purposes</title>
        <link>https://www.group-ib.com/blog/deadlock-ransomware-polygon-smart-contracts/</link>
        <description>This blog uncovers DeadLock’s stealthy usage of Polygon smart contracts for proxy address storage, a poorly-documented and under-reported technique that Group-IB analysts have observed increased usage in the wild. Variants of this technique are very wide and offer great alternatives to threat actors for bypassing traditional defenses by abusing decentralized blockchains available worldwide.</description>        <pubDate>Thu, 15 Jan 2026 06:07:08</pubDate>
        <guid>https://www.group-ib.com/blog/deadlock-ransomware-polygon-smart-contracts/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300x300_hq.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Ghost Tapped: Tracking the Rise of Chinese Tap-to-pay Android Malware</title>
        <link>https://www.group-ib.com/blog/ghost-tapped-chinese-malware/</link>
        <description>Group-IB researchers detail the inner workings of Chinese tap-to-pay schemes on Telegram and examine the NFC-enabled Android apps fraudsters are using to steal money from victim’s bank cards and mobile wallets remotely.</description>        <pubDate>Wed, 07 Jan 2026 07:00:34</pubDate>
        <guid>https://www.group-ib.com/blog/ghost-tapped-chinese-malware/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-12.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>The DocuSign Impersonation Wave with Real-Time Customizable LogoKit</title>
        <link>https://www.group-ib.com/blog/docusign-impersonation-logokit/</link>
        <description>Learn how Group-IB’s Business Email Protection stops the growing wave of DocuSign impersonation before users are exposed, and protects them from credential-capturing websites built with  real-time customizable LogoKit.</description>        <pubDate>Mon, 05 Jan 2026 08:15:36</pubDate>
        <guid>https://www.group-ib.com/blog/docusign-impersonation-logokit/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-11.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Empty Promises in MENA: How Online Quick Cash Schemes Exploit the Gig Economy</title>
        <link>https://www.group-ib.com/blog/online-job-scams-mena/</link>
        <description>Fake online job ads continue to circulate across social media, especially in Arab countries, offering easy remote work and quick income. The sinister goal: to harvest sensitive information, from ID documents to banking details. This blog explains how the scheme operates, who the scammers target, and how to prevent falling victim to it.</description>        <pubDate>Wed, 24 Dec 2025 07:04:32</pubDate>
        <guid>https://www.group-ib.com/blog/online-job-scams-mena/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-10.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Choose Your Fighter: A New Stage in the Evolution of Android SMS Stealers in Uzbekistan</title>
        <link>https://www.group-ib.com/blog/mobile-malware-uzbekistan/</link>
        <description>Group-IB analyzes the evolution of Android malware in Uzbekistan, revealing advanced droppers, encrypted payload delivery, anti-analysis techniques, and Wonderland’s bidirectional SMS-stealing capabilities driving large-scale financial fraud.</description>        <pubDate>Fri, 19 Dec 2025 07:53:15</pubDate>
        <guid>https://www.group-ib.com/blog/mobile-malware-uzbekistan/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog_banner_300x300_square.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Your Updated Guide to AI in Cybersecurity: Adoption, Trends, Challenges, and The Future</title>
        <link>https://www.group-ib.com/blog/ai-cybersecurity-guide-2025/</link>
        <description>AI in cybersecurity is changing the threat landscape faster than ever. Stay current and prepared with Group-IB.</description>        <pubDate>Fri, 12 Dec 2025 08:22:21</pubDate>
        <guid>https://www.group-ib.com/blog/ai-cybersecurity-guide-2025/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-6.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Fighting Credit Fraud in Uzbekistan: An Uphill Battle Against Social Engineering</title>
        <link>https://www.group-ib.com/blog/credit-fraud-in-uzbekistan/</link>
        <description>Comprehensive insights into Uzbekistan’s credit fraud trends, the methods used by fraudsters, and the practical security controls financial institutions are fighting back with.</description>        <pubDate>Thu, 11 Dec 2025 07:32:17</pubDate>
        <guid>https://www.group-ib.com/blog/credit-fraud-in-uzbekistan/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-9.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Stranger Threats Are Coming: Group-IB Cyber Predictions for 2026 and Beyond</title>
        <link>https://www.group-ib.com/blog/cyber-predictions-2026/</link>
        <description> Stranger things are happening in the upside-down world of cybercrime. Group-IB’s CEO, Dmitry Volkov, shares his cyber predictions for 2026 — what’s coming next, and what we must collectively fight against.</description>        <pubDate>Wed, 10 Dec 2025 07:45:51</pubDate>
        <guid>https://www.group-ib.com/blog/cyber-predictions-2026/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/predictions-2026-1.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Hook for Gold: Inside GoldFactory&#8217;s Сampaign That Turns Apps Into Goldmines</title>
        <link>https://www.group-ib.com/blog/turning-apps-into-gold/</link>
        <description>A deep dive into GoldFactory’s evolving mobile fraud campaigns across APAC, including modified banking apps, new malware variants such as Gigaflower, shared criminal infrastructure, and insights from the Group-IB Fraud Matrix, with recommendations for organizations and end users.</description>        <pubDate>Wed, 03 Dec 2025 06:59:15</pubDate>
        <guid>https://www.group-ib.com/blog/turning-apps-into-gold/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-7.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Can You Actually Stop APP Fraud Before It Happens? Inside The Secure, Real-Time Fraud Intelligence Network Proving It’s Possible</title>
        <link>https://www.group-ib.com/blog/app-fraud-prevention/</link>
        <description>Discover how real-time fraud intelligence sharing prevents APP fraud before losses. Stop mule accounts already during warm-up with GDPR-compliant technology.</description>        <pubDate>Tue, 02 Dec 2025 03:40:24</pubDate>
        <guid>https://www.group-ib.com/blog/app-fraud-prevention/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-5.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Bloody Wolf: A Blunt Crowbar Threat To Justice</title>
        <link>https://www.group-ib.com/blog/bloody-wolf/</link>
        <description>Since late June 2025, Group-IB analysts observed a surge in spear-phishing emails across Central Asia. The attackers impersonate government agencies to gain the trust of their victims. This blog describes the techniques, tools and ongoing activity of the threat group known as Bloody Wolf.</description>        <pubDate>Wed, 26 Nov 2025 08:22:56</pubDate>
        <guid>https://www.group-ib.com/blog/bloody-wolf/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-4.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Uncovering a Multi-Stage Phishing Kit Targeting Italy&#8217;s Infrastructure</title>
        <link>https://www.group-ib.com/blog/uncover-phishing-italy/</link>
        <description>Group-IB researchers uncovered a professional phishing framework that mimics trusted brands with remarkable precision. Using layered evasion, CAPTCHA filtering, and Telegram-based data exfiltration, attackers harvest credentials and bypass automated detection. The findings highlight how phishing-as-a-service operations are scaling through automation, lowering technical barriers for cybercriminals, and industrializing one of the oldest yet most effective forms of digital fraud.</description>        <pubDate>Thu, 13 Nov 2025 07:09:17</pubDate>
        <guid>https://www.group-ib.com/blog/uncover-phishing-italy/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-2-1.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Ghosts in /proc: Manipulation and Timeline Corruption</title>
        <link>https://www.group-ib.com/blog/ghosts-in-proc/</link>
        <description>Discover how attackers could manipulate the Linux /proc filesystem to hide malicious processes and distort forensic timelines. This technical deep dive highlights examples of command-line substitution and start time corruption, and offers detection and defense strategies for incident responders and security analysts.</description>        <pubDate>Wed, 05 Nov 2025 06:57:34</pubDate>
        <guid>https://www.group-ib.com/blog/ghosts-in-proc/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog_banner_300x300.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Detecting the NPM Supply Chain Compromise Before It Spread</title>
        <link>https://www.group-ib.com/blog/detect-npm-supply-chain-attack/</link>
        <description>Discover how Group-IB’s Business Email Protection (BEP) could prevent an NPM supply chain compromise by detecting the initial phishing email that led to the developer’s infection.</description>        <pubDate>Fri, 31 Oct 2025 07:30:48</pubDate>
        <guid>https://www.group-ib.com/blog/detect-npm-supply-chain-attack/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-1-2.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>The Illusion of Wealth: Inside the Engineered Reality of Investment Scam Platforms</title>
        <link>https://www.group-ib.com/blog/illusion-wealth-investment-scams/</link>
        <description>This blog details online investment scam campaigns, including fraudulent cryptocurrency, forex, and trading platforms, while offering a technical investigation guide for investigators, based on Group-IB’s technical investigation methodology. It outlines the social engineering tactics and victim manipulation models employed, describes the fraud actor structures behind these schemes, and highlights key infrastructure artifacts identified by Group-IB High-Tech Investigations analysts that can be leveraged by cybersecurity professionals for detection and disruption.</description>        <pubDate>Tue, 28 Oct 2025 09:06:32</pubDate>
        <guid>https://www.group-ib.com/blog/illusion-wealth-investment-scams/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail-300x300-3.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Unmasking MuddyWater’s New Malware Toolkit Driving International Espionage</title>
        <link>https://www.group-ib.com/blog/muddywater-espionage/</link>
        <description>Group-IB Threat Intelligence has uncovered a sophisticated phishing campaign, attributed with high confidence to the Advanced Persistent Threat (APT) MuddyWater. The attack used a compromised mailbox to distribute Phoenix backdoor malware to international organizations and across the whole Middle East and North Africa region, targeting more than 100 government entities.</description>        <pubDate>Wed, 22 Oct 2025 07:01:54</pubDate>
        <guid>https://www.group-ib.com/blog/muddywater-espionage/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/graph-300x300-crop.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Exposing the Immediate Era Fraud in Singapore</title>
        <link>https://www.group-ib.com/blog/immediate-era-fraud-singapore/</link>
        <description>Group-IB’s Threat Intelligence Report on a Singapore-Targeted Scam Operation</description>        <pubDate>Tue, 21 Oct 2025 06:56:31</pubDate>
        <guid>https://www.group-ib.com/blog/immediate-era-fraud-singapore/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/abm_image_300x300.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>East-west tension: Are NDR vendors monitoring the wrong traffic?</title>
        <link>https://www.group-ib.com/blog/east-west-ndr/</link>
        <description>Most NDR deployments focus on perimeter traffic. Meanwhile, attackers move laterally inside networks. Here’s why east-west visibility is the blind spot that defines today’s biggest breaches.</description>        <pubDate>Fri, 17 Oct 2025 07:46:08</pubDate>
        <guid>https://www.group-ib.com/blog/east-west-ndr/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/image_300x300.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>A new weapon against payment fraud: Unique threat intelligence for anti-fraud teams</title>
        <link>https://www.group-ib.com/blog/payment-fraud-defense/</link>
        <description>Group-IB’s Suspicious Payment Details module for Threat Intelligence delivers payment identifiers tied to ransomware, illegal casinos, and laundering schemes. Fraud, AML, and compliance teams can now stop money from reaching criminal infrastructure.</description>        <pubDate>Wed, 15 Oct 2025 07:37:31</pubDate>
        <guid>https://www.group-ib.com/blog/payment-fraud-defense/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-image-300x300-crop.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Top 7 Cybersecurity Newsletters Worth Your Inbox</title>
        <link>https://www.group-ib.com/blog/cybersecurity-newsletters/</link>
        <description>Your inbox deserves better than spam. Here are 7 cybersecurity newsletters that actually inform and make you a little smarter each week.</description>        <pubDate>Wed, 08 Oct 2025 04:01:00</pubDate>
        <guid>https://www.group-ib.com/blog/cybersecurity-newsletters/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/picture_300x300_cover-1.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Tracking MuddyWater in Action: Infrastructure, Malware and Operations during 2025</title>
        <link>https://www.group-ib.com/blog/muddywater-infrastructure-malware/</link>
        <description>The blog provides an in-depth look at MuddyWater’s evolution in tooling, targeting, and infrastructure management, suggesting a more mature and capable advanced persistent threat within the META region.</description>        <pubDate>Wed, 17 Sep 2025 07:48:15</pubDate>
        <guid>https://www.group-ib.com/blog/muddywater-infrastructure-malware/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-image-1680x993-231.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>10 Cybersecurity Podcasts to Add to Your Queue Now</title>
        <link>https://www.group-ib.com/blog/cybersecurity-podcasts/</link>
                <pubDate>Fri, 05 Sep 2025 08:31:25</pubDate>
        <guid>https://www.group-ib.com/blog/cybersecurity-podcasts/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-image-with-title-1680x993-1-2.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>From Deepfakes to Dark LLMs: 5 use-cases of how AI is Powering Cybercrime</title>
        <link>https://www.group-ib.com/blog/ai-cybercrime-usecases/</link>
        <description>AI in cybercrime is evolving fast, fueling AI phishing attacks, AI scam calls, AI voice cloning scams, and even AI deepfake scams. From Dark LLMs to next-gen AI phishing tactics, we break down how criminals exploit AI today and what you can do to stay protected. </description>        <pubDate>Wed, 03 Sep 2025 07:49:47</pubDate>
        <guid>https://www.group-ib.com/blog/ai-cybercrime-usecases/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-1-1.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>ShadowSilk: A Cross-Border Binary Union for Data Exfiltration</title>
        <link>https://www.group-ib.com/blog/shadowsilk/</link>
        <description>This blog describes attacks on victims in Central Asia and APAC. Research into the attack has identified a group also called YoroTrooper. We also identified profiles of attackers on hacker forums, their malicious web-panels, test infections of attackers' own machines, and screenshots of attackers' desktops.</description>        <pubDate>Wed, 27 Aug 2025 07:50:22</pubDate>
        <guid>https://www.group-ib.com/blog/shadowsilk/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300x300.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Trust issues: How email threats hide behind your partners</title>
        <link>https://www.group-ib.com/blog/how-email-threats-hide-behind-your-partners/</link>
        <description>The most widely used email security tools still focus on yesterday’s threats. Meanwhile, attackers have moved on. By hijacking legitimate business relationships and embedding infostealers in familiar-sounding, well-written emails, cybercriminals bypass conventional defenses. The only way to keep up is by using a behavioral approach.</description>        <pubDate>Mon, 25 Aug 2025 09:04:14</pubDate>
        <guid>https://www.group-ib.com/blog/how-email-threats-hide-behind-your-partners/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-47.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Evolving Mule Tactics in the META Region Banking Sector</title>
        <link>https://www.group-ib.com/blog/evolving-mule-tactics/</link>
        <description>Discover how mule operators evolved in META-region banks—from IP masking to Starlink tactics with advanced GPS spoofing, SIM abuse, and device muling—and how layered fraud detection strategies fought back.</description>        <pubDate>Wed, 20 Aug 2025 06:44:53</pubDate>
        <guid>https://www.group-ib.com/blog/evolving-mule-tactics/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/website_thumbnail_300h300-1-min.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Exposing Investment Scams: AI Trading, Deepfake &#038; Online Fraud</title>
        <link>https://www.group-ib.com/blog/exposing-investment-scams/</link>
        <description>Discover how AI trading scams and deepfake scam videos fuel fake trading platforms. Discover how to spot investment scam signals and avoid online trading scams.</description>        <pubDate>Wed, 13 Aug 2025 06:58:28</pubDate>
        <guid>https://www.group-ib.com/blog/exposing-investment-scams/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/website_thumbnail_300h300.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>The Anatomy of a Deepfake Voice Phishing Attack: How AI-Generated Voices Are Powering the Next Wave of Scams</title>
        <link>https://www.group-ib.com/blog/voice-deepfake-scams/</link>
        <description>Discover how AI voice deepfake vishing exploits trust, drains millions, and learn practical steps to detect and stop voice‑based scams.</description>        <pubDate>Wed, 06 Aug 2025 07:32:43</pubDate>
        <guid>https://www.group-ib.com/blog/voice-deepfake-scams/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-1.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>UNC2891 Bank Heist: Physical ATM Backdoor &#038; Linux Forensic Evasion</title>
        <link>https://www.group-ib.com/blog/unc2891-bank-heist/</link>
        <description>Deep dive into UNC2891’s multi‑stage bank intrusion: Raspberry Pi ATM implant, bind mount evasion, Dynamic DNS C2, and a CAKETAP move toward HSM manipulation.</description>        <pubDate>Wed, 30 Jul 2025 07:46:37</pubDate>
        <guid>https://www.group-ib.com/blog/unc2891-bank-heist/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Predictive AI: The “Quiet Catalyst” Behind The Future of Cybersecurity</title>
        <link>https://www.group-ib.com/blog/predictive-ai/</link>
        <description>Think threat actors are unpredictable? The rise of intelligence-driven defense and the push for incident predictions might just give us the edge to know their next moves…long before they make it. </description>        <pubDate>Fri, 25 Jul 2025 07:51:26</pubDate>
        <guid>https://www.group-ib.com/blog/predictive-ai/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/test.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Signed, Sealed, Altered? Deepdive into PDF Tampering</title>
        <link>https://www.group-ib.com/blog/pdf-tampering/</link>
        <description>Uncovering the validity of a PDF by utilizing some of the tools and methods to detect changes made to a PDF, and understand the limitations in proving PDF integrity.</description>        <pubDate>Wed, 23 Jul 2025 07:48:05</pubDate>
        <guid>https://www.group-ib.com/blog/pdf-tampering/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/pdf_banner_square_300.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Fraud-Proof Your Security: How BioConfirm Protects iGaming Platforms and Players</title>
        <link>https://www.group-ib.com/blog/bioconfirm-security/</link>
        <description>Enable real-time, token-based account security that stops withdrawal fraud before your brand, players, and their revenue are compromised.</description>        <pubDate>Tue, 22 Jul 2025 09:45:36</pubDate>
        <guid>https://www.group-ib.com/blog/bioconfirm-security/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/300h300-2.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Fake Receipts Generators: the rising threat to major retail brands</title>
        <link>https://www.group-ib.com/blog/fake-receipts-generators/</link>
        <description>Scammers are using tools like MaisonReceipts to create fake receipts and exploit brands. Uncover how this growing fraud ecosystem works behind the scenes.</description>        <pubDate>Thu, 17 Jul 2025 06:27:53</pubDate>
        <guid>https://www.group-ib.com/blog/fake-receipts-generators/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/300h300-1.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Combolists and ULP Files on the Dark Web: A Secondary and Unreliable Source of Information about Compromises</title>
        <link>https://www.group-ib.com/blog/combolists-ulp-darkweb/</link>
        <description>The blog is dedicated to the analysis of combolist and URL-Login-Password (ULP) files published on the dark web and establishing the reasons why they are mostly a secondary or untrustworthy source of compromising any data</description>        <pubDate>Tue, 08 Jul 2025 08:07:55</pubDate>
        <guid>https://www.group-ib.com/blog/combolists-ulp-darkweb/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/300h300.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Authenticate Users, Secure Transactions: How BioConfirm Secures High-Stakes Banking Operations</title>
        <link>https://www.group-ib.com/blog/bioconfirm/</link>
        <description> Introducing BioConfirm - Enable real-time, token-based user account security that stops withdrawal fraud before your brand, customers’ trust, and revenue are compromised. </description>        <pubDate>Mon, 07 Jul 2025 07:03:40</pubDate>
        <guid>https://www.group-ib.com/blog/bioconfirm/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-image-1680x993-101.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Exploiting Trust: How Signed Drivers Fuel Modern Kernel Level Attacks on Windows</title>
        <link>https://www.group-ib.com/blog/kernel-driver-threats/</link>
        <description>Discover how attackers leverage Windows Kernel loaders and abuse digitally signed drivers to gain privileged access, disable security tools, and stealthily maintain control — bypassing traditional defenses and enabling advanced threat operations.</description>        <pubDate>Fri, 04 Jul 2025 10:59:11</pubDate>
        <guid>https://www.group-ib.com/blog/kernel-driver-threats/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300-2.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>One attack, one alert: From thousands of signals to one clear story</title>
        <link>https://www.group-ib.com/blog/one-attack-one-alert/</link>
        <description>Discover how Smart Alert in Group-IB Managed XDR consolidates thousands of alerts into one, cuts alert volume by 80%, and automates SOC detection and triage with AI. </description>        <pubDate>Fri, 04 Jul 2025 07:50:48</pubDate>
        <guid>https://www.group-ib.com/blog/one-attack-one-alert/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/thumbnail_300h300_3379.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>June&#8217;s Dark Gift: The Rise of Qwizzserial</title>
        <link>https://www.group-ib.com/blog/rise-of-qwizzserial/</link>
        <description>Discovered by Group-IB in mid-2024, the Qwizzserial, which was initially not very active, began to spread strongly in Uzbekistan, masquerading as legitimate applications. The malware steals banking information and intercepts 2FA sms, transmitting it to fraudsters via Telegram bots.</description>        <pubDate>Wed, 02 Jul 2025 08:08:02</pubDate>
        <guid>https://www.group-ib.com/blog/rise-of-qwizzserial/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/rectangle-40574.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Middle East Cyber Escalation: From Hacktivism to Sophisticated Threat Operations</title>
        <link>https://www.group-ib.com/blog/middle-east-cyber-escalation/</link>
        <description> Regional Conflict Monitoring (June 13 - 20, 2025)</description>        <pubDate>Mon, 23 Jun 2025 18:22:25</pubDate>
        <guid>https://www.group-ib.com/blog/middle-east-cyber-escalation/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/image_resized_300x300.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Declaration trap: Crypto Drainers masquerading as European Tax Authorities</title>
        <link>https://www.group-ib.com/blog/declaration-trap/</link>
        <description>Scammers are using fake tax authority emails to deploy crypto drainers. Discover how the declaration trap works and how to protect your digital assets.</description>        <pubDate>Thu, 19 Jun 2025 06:01:17</pubDate>
        <guid>https://www.group-ib.com/blog/declaration-trap/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-image-1680x993-81.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Disguised Cyber Risks On The Colombian Shore: The Insurance Trap</title>
        <link>https://www.group-ib.com/blog/colombian-cybertrap/</link>
        <description>Uncover how cybercriminals in Colombia impersonate financial brands and exploit public data to craft convincing vehicle insurance scams.</description>        <pubDate>Thu, 15 May 2025 07:47:55</pubDate>
        <guid>https://www.group-ib.com/blog/colombian-cybertrap/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-image-1680x993-51.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Understanding Credential Harvesting via PAM: A Real-World Threat</title>
        <link>https://www.group-ib.com/blog/pam-harvesting-insight/</link>
        <description>Learn how attackers exploit Pluggable Authentication Modules (PAM) for credential harvesting—and discover defenses to harden Linux authentication.</description>        <pubDate>Thu, 08 May 2025 07:13:42</pubDate>
        <guid>https://www.group-ib.com/blog/pam-harvesting-insight/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-banner-without-title-21.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>How To Avoid Critical Integration Mistakes In Your Cybersecurity Stack</title>
        <link>https://www.group-ib.com/blog/cyber-integration-mistakes/</link>
                <pubDate>Mon, 05 May 2025 08:56:07</pubDate>
        <guid>https://www.group-ib.com/blog/cyber-integration-mistakes/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-image-1680x993-23.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Ransomware debris: an analysis of the RansomHub operation</title>
        <link>https://www.group-ib.com/blog/ransomware-debris/</link>
        <description>This blog on RansomHub provides an overview into how this Ransomware-as-a-Service (RaaS) group operates, including its extortion tactics, affiliate recruitment strategies, and the features of its affiliate panel.</description>        <pubDate>Wed, 30 Apr 2025 06:00:47</pubDate>
        <guid>https://www.group-ib.com/blog/ransomware-debris/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog3-31.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Toll of Deception: Where Evasion Drives Phishing Forward</title>
        <link>https://www.group-ib.com/blog/toll-of-deception/</link>
        <description>Discover the latest phishing campaign targeting a major toll road service provider, where cybercriminals use sophisticated evasion techniques to bypass security detections. This in-depth blog reveals how threat actors exploit legitimate platforms and deploy cloaking methods to disguise malicious links, allowing them to evade detection by security solutions. Discover how these sophisticated tactics create highly convincing phishing pages designed to steal victims’ card information, and how to safeguard yourself against these evolving cyber threats.</description>        <pubDate>Wed, 23 Apr 2025 07:05:29</pubDate>
        <guid>https://www.group-ib.com/blog/toll-of-deception/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-banner-without-title-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Fast, smart, and private: Group-IB introduces AI Assistant</title>
        <link>https://www.group-ib.com/blog/smart-ai-assistant/</link>
        <description>Our new LLM-powered chatbot is designed for efficiency and security. Discover how Group-IB AI Assistant enhances threat intelligence workflows and provides security teams with instant insights — without compromising privacy.</description>        <pubDate>Fri, 18 Apr 2025 08:04:29</pubDate>
        <guid>https://www.group-ib.com/blog/smart-ai-assistant/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-image-1680x993-12.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Typical Dark Web Fraud: Where Scammers Operate and What They Look Like</title>
        <link>https://www.group-ib.com/blog/dark-web-fraud/</link>
                <pubDate>Wed, 16 Apr 2025 07:02:21</pubDate>
        <guid>https://www.group-ib.com/blog/dark-web-fraud/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-image-1680x993-43.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>CISOs Top Order Of Business: Cyber Risk Reduction &#038; Management</title>
        <link>https://www.group-ib.com/blog/ciso-risk-management/</link>
        <description>For modern CISOs, cyber risk management and reduction are nonstop challenges. But this blog offers exactly what you need to build a strategy that empowers you to manage and mitigate threats—cutting through the noise of an otherwise demanding role.</description>        <pubDate>Fri, 11 Apr 2025 08:50:31</pubDate>
        <guid>https://www.group-ib.com/blog/ciso-risk-management/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-image-1680x993-1-11.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>SMS Pumping: How Criminals Turn Your Messaging Service into Their Cash Machine</title>
        <link>https://www.group-ib.com/blog/sms-pumping/</link>
                <pubDate>Wed, 09 Apr 2025 06:04:30</pubDate>
        <guid>https://www.group-ib.com/blog/sms-pumping/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-image-1680x9932-min.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Fraud Underbelly: Australia’s Digital Boom—A Fraudster’s Goldmine?</title>
        <link>https://www.group-ib.com/blog/fraud-underbelly-australia/</link>
        <description>Know exactly how cybercriminals are orchestrating attacks on Australia’s citizens and digital assets, and why are they a lucrative target? </description>        <pubDate>Thu, 03 Apr 2025 07:16:21</pubDate>
        <guid>https://www.group-ib.com/blog/fraud-underbelly-australia/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-image-1680x993-1-2-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>The beginning of the end: the story of Hunters International</title>
        <link>https://www.group-ib.com/blog/hunters-international-ransomware-group/</link>
        <description>Learn about technical details on the ransomware and Storage Software tool, how the criminals use the affiliate panel as well as information on the Hunters International ransomware group from its emergence to the end of the operation.</description>        <pubDate>Wed, 02 Apr 2025 06:02:43</pubDate>
        <guid>https://www.group-ib.com/blog/hunters-international-ransomware-group/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/background.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Navigating Cybercrime Currents in Latin America: Strengthening the Region’s Defenses</title>
        <link>https://www.group-ib.com/blog/navigating-cybercrime-latin-america/</link>
        <description>Stripping down barriers of distance, language, and the unknown, Group-IB’s mission to fight cybercrime brings us to our latest frontier –Latin America. Join us as we uncover the region’s deceptive criminals and tactics.</description>        <pubDate>Thu, 27 Mar 2025 08:09:36</pubDate>
        <guid>https://www.group-ib.com/blog/navigating-cybercrime-latin-america/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-image-1680x993-1-1.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Unmasking the Classiscam in Central Asia</title>
        <link>https://www.group-ib.com/blog/unmasking-the-classiscam-in-central-asia/</link>
        <description>Scams like Classiscam automate fake websites to steal financial data, exploiting digitalization’s rise in developing countries, making fraud both effective and hard to detect. In this blog, we dissect the inner working of the scam and its prevalence in Central Asia.</description>        <pubDate>Wed, 26 Mar 2025 09:03:35</pubDate>
        <guid>https://www.group-ib.com/blog/unmasking-the-classiscam-in-central-asia/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-banner-without-title.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Hunting Rituals #5: Why hypothesis-based threat hunting is essential in cybersecurity</title>
        <link>https://www.group-ib.com/blog/hunting-rituals-5/</link>
        <description>Discover how hypothesis-driven threat hunting uncovered stealthy malware. Learn why having a dedicated in-house team or leveraging expert threat hunting services is crucial for modern cybersecurity.</description>        <pubDate>Mon, 24 Mar 2025 12:47:48</pubDate>
        <guid>https://www.group-ib.com/blog/hunting-rituals-5/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-image-1680x9931-1.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>The Cybercriminal with Four Faces: Revealing Group-IB&#8217;s Investigation into ALTDOS, DESORDEN, GHOSTR and 0mid16B</title>
        <link>https://www.group-ib.com/blog/the-cybercriminal-with-four-faces-revealing-group-ib-s-investigation-into-altdos-desorden-ghostr-and-0mid16b/</link>
        <description>Following the arrest of the cybercriminal behind the aliases ALTDOS, DESORDEN, GHOSTR, and 0mid16B, Group-IB provides a deep dive into his activities, uncovering striking similarities and unmasking the cybercriminal that breached more than 90 instances of data leaks worldwide over the span of four years in operation.</description>        <pubDate>Thu, 20 Mar 2025 09:09:01</pubDate>
        <guid>https://www.group-ib.com/blog/the-cybercriminal-with-four-faces-revealing-group-ib-s-investigation-into-altdos-desorden-ghostr-and-0mid16b/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-banner-without-title-1680x993-min1.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>ClickFix: The Social Engineering Technique Hackers Use to Manipulate Victims</title>
        <link>https://www.group-ib.com/blog/clickfix-the-social-engineering-technique-hackers-use-to-manipulate-victims/</link>
        <description>Discover how the ClickFix social engineering attack exploits human psychology to bypass security. Learn how hackers use this tactic and how to protect against it.</description>        <pubDate>Thu, 13 Mar 2025 08:11:27</pubDate>
        <guid>https://www.group-ib.com/blog/clickfix-the-social-engineering-technique-hackers-use-to-manipulate-victims/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-banner-without-title-min11.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>The Evolution of SIM Swapping Fraud: How Fraudsters Bypass Security Layers</title>
        <link>https://www.group-ib.com/blog/the-evolution-of-sim-swapping-fraud-how-fraudsters-bypass-security-layers/</link>
        <description>Discover how SIM swapping fraud has evolved, how cybercriminals bypass security layers, and the best ways to protect yourself from SIM swap attacks. Learn key prevention tips now.</description>        <pubDate>Mon, 10 Mar 2025 07:14:19</pubDate>
        <guid>https://www.group-ib.com/blog/the-evolution-of-sim-swapping-fraud-how-fraudsters-bypass-security-layers/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-image-1680x993-11-1.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Building Zero Trust Security: Selectively Trust To Rightfully Secure</title>
        <link>https://www.group-ib.com/blog/building-zero-trust-security-selectively-trust-to-rightfully-secure/</link>
        <description>Build resilience with a zero trust cybersecurity model. Leverage your existing infrastructure for stronger security. Get all essential insights to start now.</description>        <pubDate>Fri, 07 Mar 2025 07:12:53</pubDate>
        <guid>https://www.group-ib.com/blog/building-zero-trust-security-selectively-trust-to-rightfully-secure/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/zero_trust_300x300_cropped.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Technology Alone Isn’t the Answer to Cyber Threats: Time to Rethink Security Culture</title>
        <link>https://www.group-ib.com/blog/technology-alone-isn-t-the-answer-to-cyber-threats-time-to-rethink-security-culture/</link>
        <description> Get the (ABCs) Awareness, Behavior, and Culture of cybersecurity right - an organization's silent drivers of cyber protection. </description>        <pubDate>Tue, 04 Mar 2025 10:10:45</pubDate>
        <guid>https://www.group-ib.com/blog/technology-alone-isn-t-the-answer-to-cyber-threats-time-to-rethink-security-culture/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog3-21.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Fingerprint Heists: How your browser fingerprint can be stolen and used by fraudsters</title>
        <link>https://www.group-ib.com/blog/fingerprint-heists/</link>
        <description>Discover how cybercriminals steal browser fingerprints to mimic users, bypass security measures, and commit online fraud. Learn how to protect your digital identity.</description>        <pubDate>Thu, 20 Feb 2025 10:19:13</pubDate>
        <guid>https://www.group-ib.com/blog/fingerprint-heists/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design1-min-22.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>RansomHub Never Sleeps Episode 1: The evolution of modern ransomware</title>
        <link>https://www.group-ib.com/blog/ransomhub-never-sleeps-episode-1/</link>
        <description>Discover how ransomware has evolved into a sophisticated cyber threat, with groups like RansomHub leading the charge. Learn more about their adaptability, TTPs, and the rise of Ransomware-as-a-service in this first-of-three-part trilogy.</description>        <pubDate>Wed, 12 Feb 2025 06:59:52</pubDate>
        <guid>https://www.group-ib.com/blog/ransomhub-never-sleeps-episode-1/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-40.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>5 ways to leverage our Malware Reports for malware analysis</title>
        <link>https://www.group-ib.com/blog/5-ways-to-leverage-our-malware-reports/</link>
        <description>Discover 5 ways to leverage Malware Reports for daily analysis and improve detection. Perfect for SOC analysts, threat hunters, and reverse engineers.</description>        <pubDate>Thu, 06 Feb 2025 06:38:20</pubDate>
        <guid>https://www.group-ib.com/blog/5-ways-to-leverage-our-malware-reports/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-37.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>The Dark Side of Automation and Rise of AI Agents: Emerging Risks of Card Testing Attacks</title>
        <link>https://www.group-ib.com/blog/the-dark-side-of-automation-and-rise-of-ai-agent/</link>
        <description>Card testing attacks exploit stolen credit card details through small, unnoticed purchases to verify active cards for larger fraud. Cybercriminals use bots, proxies, and automation to evade detection, making real-time fraud prevention challenging. Learn how these attacks work and how to protect against them.</description>        <pubDate>Wed, 05 Feb 2025 07:58:39</pubDate>
        <guid>https://www.group-ib.com/blog/the-dark-side-of-automation-and-rise-of-ai-agent/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-38.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Cat’s out of the bag: Lynx Ransomware-as-a-Service</title>
        <link>https://www.group-ib.com/blog/cat-s-out-of-the-bag-lynx-ransomware/</link>
        <description>In this blog, we observed how the Lynx Ransomware-as-a-Service (RaaS) group operates, detailing the workflow of their affiliates within the panel, their cross-platform ransomware arsenal, customizable encryption modes, and advanced technical capabilities.</description>        <pubDate>Tue, 28 Jan 2025 06:43:27</pubDate>
        <guid>https://www.group-ib.com/blog/cat-s-out-of-the-bag-lynx-ransomware/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-36.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Odds &#038; Ends: Unraveling the Surebet Playbook</title>
        <link>https://www.group-ib.com/blog/odds-ends-unraveling-the-surebet-playbook/</link>
        <description>Discover the world of surebets, a strategy that guarantees profits by leveraging differing odds from multiple bookmakers. Explore how this approach impacts the betting market, challenging traditional profit models and increasing operational costs for bookmakers.</description>        <pubDate>Wed, 22 Jan 2025 07:14:53</pubDate>
        <guid>https://www.group-ib.com/blog/odds-ends-unraveling-the-surebet-playbook/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-33.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Group-IB&#8217;s GLOCAL Vision Leading The Fight Against Global Cybercrime</title>
        <link>https://www.group-ib.com/blog/glocal-vision/</link>
        <description>How is Group-IB evolving into a leading cybersecurity force that the community relies on?</description>        <pubDate>Tue, 21 Jan 2025 04:00:15</pubDate>
        <guid>https://www.group-ib.com/blog/glocal-vision/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-28.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>The Realty of Deception: Real Estate Frauds Uncovered in the Middle East</title>
        <link>https://www.group-ib.com/blog/the-reality-of-deception-real-estate-scams/</link>
        <description>Real estate scams are on the rise as fraudsters exploit online platforms to deceive victims into paying for fake properties. This blog dives into how these scams operate in the Middle East, explains the tools and techniques used to detect and disrupt money-mule networks, and provides practical tips for staying safe.</description>        <pubDate>Thu, 16 Jan 2025 07:24:50</pubDate>
        <guid>https://www.group-ib.com/blog/the-reality-of-deception-real-estate-scams/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-30.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Beyond AI: Group-IB&#8217;s Local Expertise in Fraud Protection</title>
        <link>https://www.group-ib.com/blog/beyond-ai/</link>
        <description>Minimize false positives, proactively prevent threats, and gain customized fraud protection with Group-IB. Our AI-powered solutions are fine-tuned by local experts and real-time threat intelligence in key regions, ensuring optimal security performance and minimal disruption to your business.</description>        <pubDate>Mon, 13 Jan 2025 06:52:43</pubDate>
        <guid>https://www.group-ib.com/blog/beyond-ai/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design1-min-14.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Social Engineering in Action: How Fraudsters Exploit Trust with Fake Refund Schemes in the Middle East</title>
        <link>https://www.group-ib.com/blog/social-engineering-in-action/</link>
        <description>Fraudsters have devised a sophisticated scheme targeting banking customers in the Middle East, impersonating government officials and using remote access software to steal credit card information and OTP codes. This scam specifically targets individuals who have lodged complaints online via a government portal, taking advantage of their trust and willingness to cooperate in hopes of refunds, leading to significant financial losses through fraudulent transactions.</description>        <pubDate>Wed, 08 Jan 2025 06:27:32</pubDate>
        <guid>https://www.group-ib.com/blog/social-engineering-in-action/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-26.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Cyber Predictions For 2025 (and Beyond): Group-IB’s Expert Take On What’s Coming</title>
        <link>https://www.group-ib.com/blog/cyber-predictions-for-2025/</link>
        <description>Don’t fall weak in the face of change and disruption. Review the upcoming cybersecurity changes and become equipped while there’s time!</description>        <pubDate>Tue, 07 Jan 2025 11:47:48</pubDate>
        <guid>https://www.group-ib.com/blog/cyber-predictions-for-2025/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design1-min-13.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Patch Me If You Can: The Truth About Smartphone Vulnerabilities</title>
        <link>https://www.group-ib.com/blog/patch-me-if-you-can/</link>
        <description>Discover how smartphone manufacturers conceal security flaws, the risks these vulnerabilities pose to users and businesses, and actionable steps to protect devices from data breaches, identity theft, and exploitative attacks. </description>        <pubDate>Wed, 18 Dec 2024 06:11:31</pubDate>
        <guid>https://www.group-ib.com/blog/patch-me-if-you-can/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design1-min-12.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Trust Hijacked: The Subtle Art of Phishing Through Familiar Facades</title>
        <link>https://www.group-ib.com/blog/trust-hijacked/</link>
        <description>Explore the advanced tactics employed in recent email phishing campaigns targeting employees from over 30 companies across 12 industries and 15 jurisdictions. This blog unveils sophisticated techniques used to outsmart Secure Email Gateways (SEGs) and exploit trusted platforms, creating highly convincing schemes to deceive victims and steal their credentials.</description>        <pubDate>Wed, 11 Dec 2024 07:11:03</pubDate>
        <guid>https://www.group-ib.com/blog/trust-hijacked/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-19.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Deepfake Fraud: How AI is Deceiving Biometric Security in Financial Institutions</title>
        <link>https://www.group-ib.com/blog/deepfake-fraud/</link>
        <description>Group-IB’s Fraud Protection team examines how fraudsters use deepfake technology to bypass biometric security in financial institutions, including facial recognition and liveness detection. This blog highlights the use of emulators, app cloning, and virtual cameras to exploit vulnerabilities, and highlights the financial and societal impacts of deepfake fraud.</description>        <pubDate>Wed, 04 Dec 2024 07:05:37</pubDate>
        <guid>https://www.group-ib.com/blog/deepfake-fraud/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-17.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Shady Bets: How to Protect Yourself from Gambling Fraud Online</title>
        <link>https://www.group-ib.com/blog/shady-bets/</link>
        <description>Scammers are using fake betting game advertisements on social media to target users, with over 500 deceptive advertisements and 1,377 malicious websites identified by Group-IB CERT. These scams promise quick money but are designed to steal personal data and funds, and this blog aims to educate users on how to recognize and protect themselves from such threats.</description>        <pubDate>Thu, 28 Nov 2024 05:52:47</pubDate>
        <guid>https://www.group-ib.com/blog/shady-bets/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design1-min-8.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Rethinking investigation: Group-IB&#8217;s Graph takes a leap forward</title>
        <link>https://www.group-ib.com/blog/rethinking-investigation/</link>
                <pubDate>Mon, 25 Nov 2024 08:05:19</pubDate>
        <guid>https://www.group-ib.com/blog/rethinking-investigation/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-15.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Tracing the Path of VietCredCare and DuckTail: Vietnamese dark market of infostealers’ data</title>
        <link>https://www.group-ib.com/blog/tracing-the-path-of-vietcredcare-and-ducktail/</link>
        <description>Following the arrest in May 2024 of more than 20 individuals behind Facebook infostealers campaigns in Vietnam, we have compared the tactics of operators behind VietCredCare and DuckTail stealers. These 2 malware families have been active before the arrest in Vietnam and are believed to be controlled by Vietnamese threat actors. Based on the research, we decided that the groups operate in a different way and the arrest probably affected the VietCredCare operators.</description>        <pubDate>Thu, 21 Nov 2024 09:33:11</pubDate>
        <guid>https://www.group-ib.com/blog/tracing-the-path-of-vietcredcare-and-ducktail/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-13.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Strengthening AML Defenses: Detect Money Mules During Their &#8216;Warm-Up&#8217; Phase</title>
        <link>https://www.group-ib.com/blog/strengthening-aml-defenses/</link>
        <description>Know the need to catch mules early in their operations to protect you from severe risks, including large-scale money laundering, compliance breaches, and business and customer disruptions.</description>        <pubDate>Fri, 15 Nov 2024 05:32:44</pubDate>
        <guid>https://www.group-ib.com/blog/strengthening-aml-defenses/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-11.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Stealthy Attributes of Lazarus APT Group: Evading Detection with Extended Attributes</title>
        <link>https://www.group-ib.com/blog/stealthy-attributes-of-apt-lazarus/</link>
        <description></description>        <pubDate>Wed, 13 Nov 2024 05:55:12</pubDate>
        <guid>https://www.group-ib.com/blog/stealthy-attributes-of-apt-lazarus/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-10.png" type="image/jpeg"/>
      </item>
	        <item>
        <title><s>Run from</s> Chase Cyber Threats</title>
        <link>https://www.group-ib.com/blog/chase-cyber-threats/</link>
        <description>Waiting for risks to be presented to you rather than actively hunting them down? After reading this, you might consider a shift in approach to improve detection and proactively counter sophisticated attacks.</description>        <pubDate>Thu, 07 Nov 2024 07:55:34</pubDate>
        <guid>https://www.group-ib.com/blog/chase-cyber-threats/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design1-min-3.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Delivery Deception: Escalating cybercriminal tactics in the Balkan region</title>
        <link>https://www.group-ib.com/blog/cybercriminal-tactics-in-the-balkan-region/</link>
        <description>Explore our latest findings on the surge of cyberattacks in the Balkan region, focusing on threats to financial institutions and critical infrastructure. Discover how phishing scams impersonating postal services are targeting citizens in Croatia, Romania, Serbia, and Slovenia, and learn about the implications for public safety and security. Stay informed and protected against the rising tide of cybercrime.</description>        <pubDate>Wed, 30 Oct 2024 05:44:14</pubDate>
        <guid>https://www.group-ib.com/blog/cybercriminal-tactics-in-the-balkan-region/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-6.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Group-IB Fraud Protection: Know your real users, catch the fraudsters</title>
        <link>https://www.group-ib.com/blog/fraud-protection-know-your-real-users/</link>
        <description>Stop fraud, RATs, and malware with Group-IB's Fraud Protection AI. Our advanced behavioral analysis uses AI to detect and prevent threats in real-time, safeguarding your business and users.</description>        <pubDate>Tue, 29 Oct 2024 08:25:44</pubDate>
        <guid>https://www.group-ib.com/blog/fraud-protection-know-your-real-users/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-5.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Global iGaming? Tailor Your Security with Group-IB Fraud Protection</title>
        <link>https://www.group-ib.com/blog/global-igaming/</link>
        <description>With Group-IB Fraud Protection, you can navigate the complexities of global iGaming regulations and risk. Tailor security measures for each market, optimize costs, and maximize growth. Learn how our advanced fraud detection and prevention tools can protect your players and profits.</description>        <pubDate>Fri, 25 Oct 2024 08:08:21</pubDate>
        <guid>https://www.group-ib.com/blog/global-igaming/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-4.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Woodn&#8217;t You Believe It? The Rise of Fake Wood Scams</title>
        <link>https://www.group-ib.com/blog/fake-wood-scams/</link>
        <description>In this blog we uncover a long-running scheme by scammers selling wood to the people in France during the winter season, and how consumers and businesses can protect themselves from financial and reputation damages.</description>        <pubDate>Tue, 22 Oct 2024 10:19:04</pubDate>
        <guid>https://www.group-ib.com/blog/fake-wood-scams/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-2.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Encrypted Symphony: Infiltrating the Cicada3301 Ransomware-as-a-Service Group</title>
        <link>https://www.group-ib.com/blog/cicada3301/</link>
        <description>In this blog, we observed how the Cicada3301 Ransomware-as-a-Service (RaaS) group operates, detailing the workflow of their affiliates within the panel and examining the Windows, Linux, ESXi, and PowerPC variants of the ransomware.</description>        <pubDate>Thu, 17 Oct 2024 07:26:32</pubDate>
        <guid>https://www.group-ib.com/blog/cicada3301/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design-min-1.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>The firming grip of cyber fraud in Asia: What effective actions must banks take today?</title>
        <link>https://www.group-ib.com/blog/firming-grip-of-cyber-fraud-in-asia/</link>
        <description>Banks' current measures against cyber fraud are falling short – and the numbers don’t lie. That said, with a hyperactive threat landscape, what steps should you take to maximize cybersecurity?</description>        <pubDate>Wed, 16 Oct 2024 08:00:31</pubDate>
        <guid>https://www.group-ib.com/blog/firming-grip-of-cyber-fraud-in-asia/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design7-min.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Unveiling USB Artifacts: A Comparative Analysis</title>
        <link>https://www.group-ib.com/blog/unveiling-usb-artifacts/</link>
        <description>Discover how USB artifacts enhance tracking user activities on files, examining the influence of operating systems, file systems, and applications on these crucial data traces.</description>        <pubDate>Thu, 10 Oct 2024 05:33:53</pubDate>
        <guid>https://www.group-ib.com/blog/unveiling-usb-artifacts/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/untitled-design.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Pig Butchering Alert: Fraudulent Trading App targeted iOS and Android users</title>
        <link>https://www.group-ib.com/blog/pig-butchering/</link>
        <description>In this article, Group-IB specialists uncovered a large-scale fraud campaign involving fake trading apps targeting Apple iOS and Android users across multiple regions through the UniApp framework, and distributed through official app stores and phishing sites.</description>        <pubDate>Wed, 02 Oct 2024 05:55:12</pubDate>
        <guid>https://www.group-ib.com/blog/pig-butchering/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/pig_butchering_blog_banner_v2-without-title-1-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Inside the Dragon: DragonForce Ransomware Group</title>
        <link>https://www.group-ib.com/blog/dragonforce-ransomware/</link>
        <description>In this blog, we look at the DragonForce ransomware group, which poses a severe threat with two variants—a LockBit fork and a customized Conti fork with advanced features and SystemBC malware.</description>        <pubDate>Wed, 25 Sep 2024 07:00:30</pubDate>
        <guid>https://www.group-ib.com/blog/dragonforce-ransomware/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/dragonforce_blog_banner_v3-without-title-1-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Storm clouds on the horizon: Resurgence of TeamTNT?</title>
        <link>https://www.group-ib.com/blog/teamtnt/</link>
        <description>Investigations into recent campaigns may suggest the reemergence of TeamTNT in 2023 to present day, since evaporating in 2022.</description>        <pubDate>Wed, 18 Sep 2024 06:56:21</pubDate>
        <guid>https://www.group-ib.com/blog/teamtnt/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/teamtnt-blog-banner-1-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Concealed networks: Are dark web syndicates turning to social media for cybercrime?</title>
        <link>https://www.group-ib.com/blog/concealed-networks/</link>
        <description>Group-IB dark web investigations: To avoid prying eyes, find out how adversaries increasingly shift from the dark web to social media to execute attacks, leak credentials, share exploitable vulnerabilities, and more.</description>        <pubDate>Mon, 16 Sep 2024 06:55:53</pubDate>
        <guid>https://www.group-ib.com/blog/concealed-networks/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/concealed-networks-1-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Ajina attacks Central Asia: Story of an Uzbek Android Pandemic</title>
        <link>https://www.group-ib.com/blog/ajina-malware/</link>
        <description>Discovered by Group-IB in May 2024, the Ajina.Banker malware is a major cyber threat in the Central Asia region, disguising itself as legitimate apps to steal banking information and intercept 2FA messages.</description>        <pubDate>Thu, 12 Sep 2024 04:53:01</pubDate>
        <guid>https://www.group-ib.com/blog/ajina-malware/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/ajina-blog-cover-small-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>The Duality of the Pluggable Authentication Module (PAM)</title>
        <link>https://www.group-ib.com/blog/pluggable-authentication-module/</link>
        <description></description>        <pubDate>Fri, 06 Sep 2024 06:50:27</pubDate>
        <guid>https://www.group-ib.com/blog/pluggable-authentication-module/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-bannerpam-blog-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>APT Lazarus: Eager Crypto Beavers, Video calls and Games</title>
        <link>https://www.group-ib.com/blog/apt-lazarus-python-scripts/</link>
        <description>Explore the growing threats posed by the Lazarus Group's financially-driven campaign against developers. We will examine their recent Python scripts, including the CivetQ and BeaverTail malware variants, along with their updated versions in Windows and Python releases. Additionally, we will analyze their tactics, techniques, and indicators of compromise.</description>        <pubDate>Wed, 04 Sep 2024 06:52:35</pubDate>
        <guid>https://www.group-ib.com/blog/apt-lazarus-python-scripts/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/lazarus-apt-malware-blog-banner-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>RansomHub ransomware-as-a-service</title>
        <link>https://www.group-ib.com/blog/ransomhub-raas/</link>
        <description>Learn why RansomHub's new affiliate program and its advanced ransomware tactics—recruiting former Scattered Spider members, exploiting unprotected RDP services, and exfiltrating large data volumes—are critical for staying ahead of modern cyber threats.</description>        <pubDate>Wed, 28 Aug 2024 06:52:55</pubDate>
        <guid>https://www.group-ib.com/blog/ransomhub-raas/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/ransomhub-ransomware-as-a-service-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Hiding in plain sight: Techniques and defenses against `/proc` filesystem manipulation in Linux</title>
        <link>https://www.group-ib.com/blog/linux-pro-manipulation/</link>
        <description>Group-IB explores methods of process visibility evasion through /proc filesystem manipulation in Linux, along with effective defenses to counteract these tactics.</description>        <pubDate>Mon, 26 Aug 2024 13:32:18</pubDate>
        <guid>https://www.group-ib.com/blog/linux-pro-manipulation/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/hiding-in-plain-sight_-techniques-and-defenses-against-_proc-filesystem-manipulation-in-linux-1-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Deciphering the Brain Cipher Ransomware</title>
        <link>https://www.group-ib.com/blog/brain-cipher-ransomware/</link>
        <description>Deep dive into Brain Cipher ransomware group's activities and techniques, and how they are seemingly linked to other ransomware groups such as EstateRansomware and SenSayQ</description>        <pubDate>Wed, 14 Aug 2024 06:45:18</pubDate>
        <guid>https://www.group-ib.com/blog/brain-cipher-ransomware/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/deciphering-the-brain-cipher-ransomware-1-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Under Siege: The threat of compromised Mobile Device Management credentials and its implications for organizational security</title>
        <link>https://www.group-ib.com/blog/compromised-mdm-credentials/</link>
        <description>The leakage of credentials for Mobile Device Management (MDM) services could pose significant risks to organizations and their data security. </description>        <pubDate>Wed, 07 Aug 2024 06:25:19</pubDate>
        <guid>https://www.group-ib.com/blog/compromised-mdm-credentials/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/mdm-blog-1-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>NIS 2 compliance for EU businesses: Meet cybersecurity requirements before the deadline (October 17)</title>
        <link>https://www.group-ib.com/blog/nis-2-compliance/</link>
        <description>With NIS 2 non-compliance proving detrimental — resulting in millions in fines, business activity suspension, and more, become compliant while there’s still time!</description>        <pubDate>Fri, 02 Aug 2024 07:48:43</pubDate>
        <guid>https://www.group-ib.com/blog/nis-2-compliance/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/nis-2-compliance-1-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Beware CraxsRAT: Android Remote Access malware strikes in Malaysia</title>
        <link>https://www.group-ib.com/blog/craxs-rat-malaysia/</link>
        <description>CraxsRAT is a notorious Android malware family known for its Remote Administration Tools (RAT), which include remote device control and advanced spyware functions like keylogging, gesture manipulation, and recording of cameras, screens, and calls.</description>        <pubDate>Wed, 31 Jul 2024 06:51:26</pubDate>
        <guid>https://www.group-ib.com/blog/craxs-rat-malaysia/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/rat-blog-cover2-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>GXC Team Unmasked: The cybercriminal group targeting Spanish bank users with AI-powered phishing tools and Android malware</title>
        <link>https://www.group-ib.com/blog/gxc-team-unmasked/</link>
        <description>Specializing in AI-powered phishing-as-a-service and Android malware capable of intercepting OTP codes, the GXC Team targets Spanish bank users and 30 institutions worldwide</description>        <pubDate>Thu, 25 Jul 2024 05:58:10</pubDate>
        <guid>https://www.group-ib.com/blog/gxc-team-unmasked/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/gxc-blog-banner-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Qilin Revisited: Diving into the techniques and procedures of the recent Qilin Ransomware Attacks</title>
        <link>https://www.group-ib.com/blog/qilin-revisited/</link>
        <description>Discover the insidious tactics of the Qilin ransomware group, notorious for their $50 million attack on the healthcare sector, impacting key NHS hospitals.</description>        <pubDate>Wed, 17 Jul 2024 06:00:37</pubDate>
        <guid>https://www.group-ib.com/blog/qilin-revisited/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/qilin-revisited-blog-1-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Group-IB Digital Risk Protection: How does it enable the fastest violation detection and takedown?</title>
        <link>https://www.group-ib.com/blog/digital-risk-protection/</link>
        <description>The digital space is riddled with risks to your brand. Ensure it stays defended with Group-IB Digital Risk Protection’s automated violation detection and takedown.</description>        <pubDate>Mon, 15 Jul 2024 07:51:30</pubDate>
        <guid>https://www.group-ib.com/blog/digital-risk-protection/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/group-ib-digital-risk-protection-blog-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Patch or Peril: A Veeam vulnerability incident</title>
        <link>https://www.group-ib.com/blog/estate-ransomware/</link>
        <description>Delaying security updates and neglecting regular reviews created vulnerabilities that were exploited by attackers, resulting in severe ransomware consequences.</description>        <pubDate>Wed, 10 Jul 2024 05:55:28</pubDate>
        <guid>https://www.group-ib.com/blog/estate-ransomware/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/patch-or-peril-1-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Breaking silos: The convergence of cybersecurity and fraud prevention</title>
        <link>https://www.group-ib.com/blog/cyber-fraud-prevention/</link>
        <description>Where adversaries do not hesitate to initiate blended attacks combining multiple tactics, why are security teams still operating in silos?</description>        <pubDate>Mon, 08 Jul 2024 07:48:57</pubDate>
        <guid>https://www.group-ib.com/blog/cyber-fraud-prevention/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/breaking-silos_-the-convergence-of-cybersecurity-and-fraud-prevention-1-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Eldorado Ransomware: The New Golden Empire of Cybercrime?</title>
        <link>https://www.group-ib.com/blog/eldorado-ransomware/</link>
        <description>All about Eldorado Ransomware and how its affiliates make their own samples for distribution.</description>        <pubDate>Wed, 03 Jul 2024 05:59:17</pubDate>
        <guid>https://www.group-ib.com/blog/eldorado-ransomware/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/el-dorado-blog-min-1-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Boost your MSSP&#8217;s competitive edge: New strategies for leveraging Threat Intelligence</title>
        <link>https://www.group-ib.com/blog/mssp-competitive-edge/</link>
        <description>How to best empower your business clients’ cybersecurity with critical cyber threat intelligence</description>        <pubDate>Mon, 01 Jul 2024 07:41:53</pubDate>
        <guid>https://www.group-ib.com/blog/mssp-competitive-edge/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/boost-your-mssps-competitive-edge-1-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Craxs Rat, the master tool behind fake app scams and banking fraud</title>
        <link>https://www.group-ib.com/blog/craxs-rat-malware/</link>
        <description>The scam schemes enabled by Craxs Rat malware provide complete remote control of the victims’ devices. Defend yourself from being next.</description>        <pubDate>Wed, 26 Jun 2024 06:37:34</pubDate>
        <guid>https://www.group-ib.com/blog/craxs-rat-malware/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/craxs-rat-blog-small-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Boolka Unveiled: From web attacks to modular malware</title>
        <link>https://www.group-ib.com/blog/boolka/</link>
        <description>Uncovering the operations of threat actor Boolka, driven by the creation of malicious scripts, malware trojans, sophisticated malware delivery platforms, and more.</description>        <pubDate>Fri, 21 Jun 2024 05:25:18</pubDate>
        <guid>https://www.group-ib.com/blog/boolka/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/boolka-blog.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>GoldPickaxe exposed: How Group-IB analyzed the face-stealing iOS Trojan and how to do it yourself</title>
        <link>https://www.group-ib.com/blog/goldpickaxe-ios-trojan/</link>
        <description>Learn how to protect your devices against evolving iOS threats</description>        <pubDate>Wed, 05 Jun 2024 09:01:42</pubDate>
        <guid>https://www.group-ib.com/blog/goldpickaxe-ios-trojan/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog2-2-2-min.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Reorienting Cybersecurity: To GenAI or not to GenAI?</title>
        <link>https://www.group-ib.com/blog/genai-or-not-genai/</link>
        <description>Amidst the GenAI revolution, how can you harness its potential to boost cybersecurity?</description>        <pubDate>Mon, 27 May 2024 07:56:10</pubDate>
        <guid>https://www.group-ib.com/blog/genai-or-not-genai/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/reorienting-cybersecurity_-to-genai-or-not-to-genai_-1.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>GDPR: A shield for consumers, a shackle for fraud fighters?</title>
        <link>https://www.group-ib.com/blog/gdpr/</link>
        <description>Does the GDPR, designed to protect customer data, unintentionally create opportunities for cybercriminals to exploit it?</description>        <pubDate>Mon, 20 May 2024 07:55:10</pubDate>
        <guid>https://www.group-ib.com/blog/gdpr/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/gdpr-blog-small.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>Generative AI: Raising the stakes for fraud in iGaming</title>
        <link>https://www.group-ib.com/blog/generative-ai/</link>
        <description>Fraudsters see potential in generative AI to defraud the gambling industry. Here’s how.</description>        <pubDate>Mon, 06 May 2024 14:01:04</pubDate>
        <guid>https://www.group-ib.com/blog/generative-ai/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/generative-ai-blog-1.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>Phishy Business: Unraveling LabHost&#8217;s scam ecosystem</title>
        <link>https://www.group-ib.com/blog/labhost-operation/</link>
        <description>Group-IB takes part in a global operation to cripple Canadian Phishing-as-a-Service provider LabHost</description>        <pubDate>Thu, 18 Apr 2024 11:09:03</pubDate>
        <guid>https://www.group-ib.com/blog/labhost-operation/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/labhost-release-1-1.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>Hunting Rituals #4: Threat hunting for execution via Windows Management Instrumentation</title>
        <link>https://www.group-ib.com/blog/hunting-rituals-4/</link>
        <description>Actionable insights on hunting for Windows Management Instrumentation (WMI) execution abuse</description>        <pubDate>Fri, 29 Mar 2024 07:58:20</pubDate>
        <guid>https://www.group-ib.com/blog/hunting-rituals-4/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/hunting-rituals_red.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>In-Depth Analysis of Pegasus Spyware and How To Detect It on Your Mobile Devices</title>
        <link>https://www.group-ib.com/blog/pegasus-spyware/</link>
        <description>How does Pegasus and other spyware work discreetly to access everything on your iOS device?</description>        <pubDate>Fri, 15 Mar 2024 08:04:00</pubDate>
        <guid>https://www.group-ib.com/blog/pegasus-spyware/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/pegasus-blog-small.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>Extra credit: VietCredCare information stealer takes aim at Vietnamese businesses</title>
        <link>https://www.group-ib.com/blog/vietcredcare-stealer/</link>
        <description>Group-IB discovers new information stealer targeting Vietnam with rare functionality to filter out Facebook accounts with advertising credits</description>        <pubDate>Wed, 21 Feb 2024 07:58:51</pubDate>
        <guid>https://www.group-ib.com/blog/vietcredcare-stealer/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/vietcredcare-2.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>Face Off: Group-IB identifies first iOS trojan stealing facial recognition data</title>
        <link>https://www.group-ib.com/blog/goldfactory-ios-trojan/</link>
        <description>Group-IB uncovers the first iOS Trojan harvesting facial recognition data used for unauthorized access to bank accounts. The GoldDigger family grows</description>        <pubDate>Thu, 15 Feb 2024 08:02:24</pubDate>
        <guid>https://www.group-ib.com/blog/goldfactory-ios-trojan/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/golddigger-family-1.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>Dead-end job: ResumeLooters infect websites in APAC through SQL injection and XSS attacks</title>
        <link>https://www.group-ib.com/blog/resumelooters/</link>
        <description>ResumeLooters gang infects websites with XSS scripts and SQL injections to vacuum up job seekers' personal data and CVs</description>        <pubDate>Tue, 06 Feb 2024 06:59:26</pubDate>
        <guid>https://www.group-ib.com/blog/resumelooters/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/resumelooters-blog2.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>Inferno Drainer: A Deep Dive into Crypto Wallet-Draining Malware</title>
        <link>https://www.group-ib.com/blog/inferno-drainer/</link>
        <description>Inferno Drainer may have shut down in November 2023, but users of the devastating scam-as-a-service platform still pose a risk as they look for other avenues.</description>        <pubDate>Tue, 16 Jan 2024 07:58:58</pubDate>
        <guid>https://www.group-ib.com/blog/inferno-drainer/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/inferno-drainer-1.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>Hunting Rituals #3: Threat hunting for scheduled tasks</title>
        <link>https://www.group-ib.com/blog/hunting-rituals-3/</link>
        <description>Actionable guide to hunting for the scheduled tasks by using Group-IB MXDR</description>        <pubDate>Fri, 29 Dec 2023 07:59:41</pubDate>
        <guid>https://www.group-ib.com/blog/hunting-rituals-3/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/hunting-rituals_red.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>The future is now: Watch out for these 20 trends that will change the course of cybersecurity (Part 2)</title>
        <link>https://www.group-ib.com/blog/cybersecurity-trends-part-2/</link>
        <description>Cybersecurity is changing, and changing fast. Learn how Group-IB can help you lead the change instead of being carried by it.</description>        <pubDate>Wed, 27 Dec 2023 07:56:25</pubDate>
        <guid>https://www.group-ib.com/blog/cybersecurity-trends-part-2/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/cybertrends2.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>The future is now: Watch out for these 20 trends that will change the course of cybersecurity (Part 1)</title>
        <link>https://www.group-ib.com/blog/cybersecurity-trends-part-1/</link>
        <description>Cybersecurity is changing, and changing fast. Learn how Group-IB can help you lead the change instead of being carried by it.</description>        <pubDate>Wed, 20 Dec 2023 07:55:30</pubDate>
        <guid>https://www.group-ib.com/blog/cybersecurity-trends-part-1/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/cybertrends2.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>You versus adversaries: How to become unbeatable in 20 cybersecurity moves (Part 2)</title>
        <link>https://www.group-ib.com/blog/you-versus-adversaries-part-2/</link>
        <description>Cybersecurity essentials that ensure your business stays undisrupted in the upcoming year.</description>        <pubDate>Fri, 15 Dec 2023 07:56:29</pubDate>
        <guid>https://www.group-ib.com/blog/you-versus-adversaries-part-2/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/you-versus-adversaries-2.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>Ace in the Hole: exposing GambleForce, an SQL injection gang</title>
        <link>https://www.group-ib.com/blog/gambleforce-gang/</link>
        <description>Analysis of TTPs tied to GambleForce, which carried out SQL injection attacks against companies in the APAC region</description>        <pubDate>Thu, 14 Dec 2023 06:02:09</pubDate>
        <guid>https://www.group-ib.com/blog/gambleforce-gang/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-gamble-force.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>You versus adversaries: How to become unbeatable in 20 cybersecurity moves (Part 1)</title>
        <link>https://www.group-ib.com/blog/you-versus-adversaries-part-1/</link>
        <description>Cybersecurity essentials that will ensure your business stays undisrupted in the upcoming year.</description>        <pubDate>Fri, 08 Dec 2023 06:57:45</pubDate>
        <guid>https://www.group-ib.com/blog/you-versus-adversaries-part-1/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/you-versus-adversaries-2.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>Curse of the Krasue: New Linux Remote Access Trojan targets Thailand</title>
        <link>https://www.group-ib.com/blog/krasue-rat/</link>
        <description>This piece of malware has an insatiable appetite. Group-IB's Threat Intelligence unit offers their insights on the new RAT used in attacks against Thai companies.</description>        <pubDate>Thu, 07 Dec 2023 05:56:15</pubDate>
        <guid>https://www.group-ib.com/blog/krasue-rat/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/curse-of-the-krasue.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>Hunting Rituals #2.2: Threat hunting for abuse of Windows Services</title>
        <link>https://www.group-ib.com/blog/hunting-rituals-windows-services-part-2/</link>
        <description>Actionable guide to hunting for the Windows Services abuse by using Group-IB MXDR.</description>        <pubDate>Wed, 22 Nov 2023 11:20:09</pubDate>
        <guid>https://www.group-ib.com/blog/hunting-rituals-windows-services-part-2/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/hunting-rituals_red.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Ransomware manager: Investigation into farnetwork, a threat actor linked to five strains of ransomware</title>
        <link>https://www.group-ib.com/blog/farnetwork/</link>
        <description>Take a deep dive into the operations of one of the most active players in the Ransomware-as-a-Service market.</description>        <pubDate>Wed, 08 Nov 2023 07:59:58</pubDate>
        <guid>https://www.group-ib.com/blog/farnetwork/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/cover-farnetwork-1.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>The untold story of incident response: Insider’s Gambit</title>
        <link>https://www.group-ib.com/blog/untold-story-insiders-gambit/</link>
        <description>Get a close look at details of the most notable cases faced by Group-IB’s Digital Forensics and Incident Response (DFIR) team</description>        <pubDate>Tue, 24 Oct 2023 08:28:50</pubDate>
        <guid>https://www.group-ib.com/blog/untold-story-insiders-gambit/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/insiders-gambit-2.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Analyzing cyber activity surrounding the conflict in the Middle East</title>
        <link>https://www.group-ib.com/blog/middle-east-conflict-week-1/</link>
        <description>Hacktivists take center stage with DDoS, defacement attacks – summary of Week 1 and 2 of the conflict. </description>        <pubDate>Tue, 17 Oct 2023 08:58:04</pubDate>
        <guid>https://www.group-ib.com/blog/middle-east-conflict-week-1/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/mea-conflict-banner.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>The untold story of incident response: A Christmas Miracle</title>
        <link>https://www.group-ib.com/blog/christmas-miracle-incident-response/</link>
        <description>Twas the night before Christmas, when out came the cry, a cyberattack is happening, so stop them, won’t you try?</description>        <pubDate>Mon, 16 Oct 2023 10:04:31</pubDate>
        <guid>https://www.group-ib.com/blog/christmas-miracle-incident-response/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/christmas-miracle-ir-1.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>Let&#8217;s dig deeper: dissecting the new Android Trojan GoldDigger with Group-IB Fraud Matrix</title>
        <link>https://www.group-ib.com/blog/golddigger-fraud-matrix/</link>
        <description>Delve into the tactics of the GoldDigger Trojan and discover ways to safeguard your customers </description>        <pubDate>Thu, 05 Oct 2023 06:55:04</pubDate>
        <guid>https://www.group-ib.com/blog/golddigger-fraud-matrix/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/golddigger-small.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>Dusting for fingerprints: ShadowSyndicate, a new RaaS player?</title>
        <link>https://www.group-ib.com/blog/shadowsyndicate-raas/</link>
        <description>No sleep until the Cybercrime Fighters Club is done with finding the answer as to who is behind this new ransomware-as-a-service affiliate.</description>        <pubDate>Tue, 26 Sep 2023 07:55:51</pubDate>
        <guid>https://www.group-ib.com/blog/shadowsyndicate-raas/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/shadowsyndicate-1.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>It’s a trap: Detecting a cryptominer on a popular website using Group-IB MXDR</title>
        <link>https://www.group-ib.com/blog/mxdr-cryptominer/</link>
        <description>Group-IB analysts discovered and analyzed a cryptojacking campaign on a popular educational resource using Group-IB Managed XDR.</description>        <pubDate>Fri, 22 Sep 2023 07:57:12</pubDate>
        <guid>https://www.group-ib.com/blog/mxdr-cryptominer/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/mxdr-small.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>Hunting Rituals #2: Threat hunting for abuse of Windows Services</title>
        <link>https://www.group-ib.com/blog/hunting-rituals-windows-services-part-1/</link>
        <description>Actionable guide to hunting for the Windows Services abuse by using Group-IB MXDR.</description>        <pubDate>Wed, 20 Sep 2023 07:59:04</pubDate>
        <guid>https://www.group-ib.com/blog/hunting-rituals-windows-services-part-1/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/hunting-rituals_red.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Incident Response through an opportunity lens: In conversation with Dmitry Volkov (CEO, Group-IB)</title>
        <link>https://www.group-ib.com/blog/incident-response-with-dmitry-volkov/</link>
        <description>Gather valuable insights on how incident response can be a make-or-break factor in securing your business. </description>        <pubDate>Mon, 18 Sep 2023 07:28:59</pubDate>
        <guid>https://www.group-ib.com/blog/incident-response-with-dmitry-volkov/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/bg-blog-1.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>From Rags to Riches: The illusion of quick wealth in investment scams</title>
        <link>https://www.group-ib.com/blog/investment-scam-global/</link>
        <description>Group-IB Digital Risk Protection uncovers malicious campaign leveraging almost 900 scam pages with potential financial damage estimated at $280,000 over four-month span</description>        <pubDate>Thu, 07 Sep 2023 08:00:20</pubDate>
        <guid>https://www.group-ib.com/blog/investment-scam-global/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/investment-scam-global-small.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>Stealing the extra mile: How fraudsters target global airlines in air miles and customer service scams</title>
        <link>https://www.group-ib.com/blog/airline-loyalty-program-protection/</link>
        <description>Uncover the vulnerabilities crippling the airline industry and learn how to implement appropriate countermeasures</description>        <pubDate>Tue, 05 Sep 2023 06:59:48</pubDate>
        <guid>https://www.group-ib.com/blog/airline-loyalty-program-protection/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/loyalty-small.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>New hierarchy, heightened threat: Classiscam’s sustained global campaign</title>
        <link>https://www.group-ib.com/blog/classiscam-2023/</link>
        <description>The automated scam-as-a-service program designed to steal your money and data is still going strong four years after launch</description>        <pubDate>Thu, 31 Aug 2023 07:59:10</pubDate>
        <guid>https://www.group-ib.com/blog/classiscam-2023/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/classiscam-2023-small.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>Traders&#8217; dollars in danger: CVE-2023-38831 zero-day vulnerability in WinRAR exploited by cybercriminals to target traders</title>
        <link>https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/</link>
        <description>Spoof extensions help cybercriminals target users on trading forums as 130 devices still infected at time of writing</description>        <pubDate>Wed, 23 Aug 2023 08:59:19</pubDate>
        <guid>https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/zero-day-small.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Hunting Rituals #1: Threat hunting for DLL side-loading</title>
        <link>https://www.group-ib.com/blog/hunting-rituals-dll-side-loading/</link>
        <description>Actionable guide to hunting for the DLL side-loading threat by using Group-IB MXDR.</description>        <pubDate>Thu, 17 Aug 2023 09:48:58</pubDate>
        <guid>https://www.group-ib.com/blog/hunting-rituals-dll-side-loading/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/hunting-rituals_red.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Breaking down Gigabud banking malware with Group-IB Fraud Matrix</title>
        <link>https://www.group-ib.com/blog/gigabud-banking-malware/</link>
        <description>Uncover the disruptive nature of Gigabud malware and take proactive measures to mitigate the associated risks</description>        <pubDate>Mon, 14 Aug 2023 07:59:38</pubDate>
        <guid>https://www.group-ib.com/blog/gigabud-banking-malware/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog-5-1.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>JOIN THE CYBERCRIME FIGHTERS CLUB</title>
        <link>https://www.group-ib.com/blog/cybercrime-fighters-club/</link>
        <description>Fighting cybercrime is more effective when we work together. Find out more about how you can work with Group-IB to document emerging threats.</description>        <pubDate>Fri, 04 Aug 2023 07:59:12</pubDate>
        <guid>https://www.group-ib.com/blog/cybercrime-fighters-club/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/club2.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Demystifying Mysterious Team Bangladesh</title>
        <link>https://www.group-ib.com/blog/mysterious-team-bangladesh/</link>
        <description>Analysis of a highly active hacktivist group with global reach</description>        <pubDate>Thu, 03 Aug 2023 08:01:37</pubDate>
        <guid>https://www.group-ib.com/blog/mysterious-team-bangladesh/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/bangladesh-1.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>Clouded Judgment: how mismanaged cloud infrastructure can expose users to cyber risks</title>
        <link>https://www.group-ib.com/blog/cloud-infrastructure-threats/</link>
        <description> Discover how organizations unwittingly create vulnerabilities by misconfiguring their cloud infrastructure</description>        <pubDate>Mon, 10 Jul 2023 07:58:36</pubDate>
        <guid>https://www.group-ib.com/blog/cloud-infrastructure-threats/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/cloud-small.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>Busting CryptosLabs: a scam ring targeting French speakers for millions</title>
        <link>https://www.group-ib.com/blog/cryptoslabs-investment-scams/</link>
        <description>Get all the undisclosed details that our investigators uncovered on CryptosLabs' full scope of fraudulent schemes</description>        <pubDate>Thu, 15 Jun 2023 07:01:32</pubDate>
        <guid>https://www.group-ib.com/blog/cryptoslabs-investment-scams/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/cryptoslab2.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Operation Triangulation: Mapping the threat</title>
        <link>https://www.group-ib.com/blog/operation-triangulation/</link>
        <description>What we know about APT campaign to date and how to detect it</description>        <pubDate>Fri, 02 Jun 2023 14:29:40</pubDate>
        <guid>https://www.group-ib.com/blog/operation-triangulation/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog1-11-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Dark Pink. Episode 2</title>
        <link>https://www.group-ib.com/blog/dark-pink-episode-2/</link>
        <description>APT Dark Pink is back with 5 victims in new countries.</description>        <pubDate>Wed, 31 May 2023 07:58:23</pubDate>
        <guid>https://www.group-ib.com/blog/dark-pink-episode-2/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/blog2-6-min.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Bridging the gap: How to leverage API security best practices to combat top 3 vulnerability types</title>
        <link>https://www.group-ib.com/blog/api-security-best-practices/</link>
        <description>Security misconfiguration, excessive data exposure, and injections top three API vulnerability types for financial and tech firms</description>        <pubDate>Tue, 30 May 2023 09:00:33</pubDate>
        <guid>https://www.group-ib.com/blog/api-security-best-practices/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/api-small.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>The distinctive rattle of APT SideWinder</title>
        <link>https://www.group-ib.com/blog/hunting-sidewinder/</link>
        <description>Bridewell and Group-IB expose the APT’s unknown infrastructure</description>        <pubDate>Wed, 17 May 2023 07:57:37</pubDate>
        <guid>https://www.group-ib.com/blog/hunting-sidewinder/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/sidewinder-apt-small.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>The Qilin Ransomware: Analysis and Protection Strategies</title>
        <link>https://www.group-ib.com/blog/qilin-ransomware/</link>
        <description>All you need to know about Qilin ransomware and its operations targeting critical sectors.</description>        <pubDate>Mon, 15 May 2023 08:20:09</pubDate>
        <guid>https://www.group-ib.com/blog/qilin-ransomware/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/qilin.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Managed upgrades. Enhance malware analysis efficiency with Group-IB Malware Detonation Platform updates</title>
        <link>https://www.group-ib.com/blog/managed-xdr-updates/</link>
        <description>New and modified malware detonation capabilities in Group-IB’s Managed XDR and Business Email Protection solutions for precise threat detection and analysis</description>        <pubDate>Tue, 02 May 2023 08:59:18</pubDate>
        <guid>https://www.group-ib.com/blog/managed-xdr-updates/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/mxdr-blog-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Tech (non)support: Scammers pose as Meta in Facebook account grab ploy</title>
        <link>https://www.group-ib.com/blog/meta-phishing-campaign/</link>
        <description>Group-IB Digital Risk Protection discovers more than 3,200 fake Facebook profiles in ongoing phishing campaign that sees scammers impersonate Meta support staff</description>        <pubDate>Tue, 25 Apr 2023 04:19:56</pubDate>
        <guid>https://www.group-ib.com/blog/meta-phishing-campaign/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/meta-phishing.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Investigation into PostalFurious: a Chinese-speaking phishing gang targeting Singapore and Australia</title>
        <link>https://www.group-ib.com/blog/phishing-investigation-guide/</link>
        <description>How to investigate phishing campaigns</description>        <pubDate>Fri, 21 Apr 2023 03:56:41</pubDate>
        <guid>https://www.group-ib.com/blog/phishing-investigation-guide/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/postal-furious.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>SimpleHarm: Tracking MuddyWater’s infrastructure</title>
        <link>https://www.group-ib.com/blog/muddywater-infrastructure/</link>
        <description>Group-IB analysts discovered the new MuddyWater infrastructure while researching the pro-state group’s use of the legitimate SimpleHelp tool.</description>        <pubDate>Tue, 18 Apr 2023 07:56:18</pubDate>
        <guid>https://www.group-ib.com/blog/muddywater-infrastructure/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/muddywaters.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>The old way: BabLock, new ransomware quietly cruising around Europe, Middle East, and Asia</title>
        <link>https://www.group-ib.com/blog/bablock-ransomware/</link>
        <description>Group-IB uncovers a new stealthy ransomware strain</description>        <pubDate>Tue, 04 Apr 2023 17:24:46</pubDate>
        <guid>https://www.group-ib.com/blog/bablock-ransomware/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/bablock.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>36gate: supply chain attack</title>
        <link>https://www.group-ib.com/blog/3cx-supply-chain-attack/</link>
        <description>What is known about the 3CX supply chain incident and how to defend against it?</description>        <pubDate>Fri, 31 Mar 2023 10:59:09</pubDate>
        <guid>https://www.group-ib.com/blog/3cx-supply-chain-attack/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/36gate.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Venomous vacancies: Job seekers across MEA hit by sting in scammers’ tail</title>
        <link>https://www.group-ib.com/blog/venomous-vacancies/</link>
        <description>Group-IB uncovers more than 2,400 scam job pages in ongoing campaign targeting users in Egypt, KSA, Algeria, and 10 other MEA countries. </description>        <pubDate>Tue, 21 Mar 2023 04:13:49</pubDate>
        <guid>https://www.group-ib.com/blog/venomous-vacancies/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/vacancies.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Bleak outlook: Mitigating CVE-2023-23397</title>
        <link>https://www.group-ib.com/blog/bleak-outlook/</link>
        <description>Microsoft Outlook Elevation of Privilege Vulnerability</description>        <pubDate>Fri, 17 Mar 2023 14:22:40</pubDate>
        <guid>https://www.group-ib.com/blog/bleak-outlook/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/bleak.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Bad Behaviour: How to detect banking trojans</title>
        <link>https://www.group-ib.com/blog/banking-malware/</link>
        <description>Mobile banking users are being manipulated by attackers to authorize fraudulent transactions. Learn what financial service providers can do to render these organized crimes powerless. </description>        <pubDate>Mon, 20 Feb 2023 09:52:20</pubDate>
        <guid>https://www.group-ib.com/blog/banking-malware/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/bad-behaviour.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Package deal: Malware bundles causing disruption and damage across EMEA</title>
        <link>https://www.group-ib.com/blog/malware-bundles/</link>
        <description>What happens when you combine ransomware with information stealers, remote access Trojans, and other malware in one easy-to-download package?</description>        <pubDate>Fri, 17 Feb 2023 07:57:45</pubDate>
        <guid>https://www.group-ib.com/blog/malware-bundles/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/package.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Nice Try Tonto Team</title>
        <link>https://www.group-ib.com/blog/tonto-team/</link>
        <description>How a nation-state APT attempted to attack Group-IB</description>        <pubDate>Mon, 13 Feb 2023 06:57:50</pubDate>
        <guid>https://www.group-ib.com/blog/tonto-team/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/tonto.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Know Thy Enemy: unraveling the “Hi-Tech Crime Trends 2022/2023” report</title>
        <link>https://www.group-ib.com/blog/know-thy-enemy/</link>
        <description>Which cybercrimes will dominate the threat landscape for 2023 and beyond? Find out!</description>        <pubDate>Fri, 10 Feb 2023 08:11:33</pubDate>
        <guid>https://www.group-ib.com/blog/know-thy-enemy/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/know-thy-enemy-3.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Dark Pink</title>
        <link>https://www.group-ib.com/blog/dark-pink-apt/</link>
        <description>New APT hitting Asia-Pacific, Europe that goes deeper and darker</description>        <pubDate>Wed, 11 Jan 2023 07:17:07</pubDate>
        <guid>https://www.group-ib.com/blog/dark-pink-apt/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/dark-pink-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Godfather Trojan &#8211; mobile banking malware that is impossible to refuse</title>
        <link>https://www.group-ib.com/blog/godfather-trojan/</link>
        <description>Group-IB discovers banking Trojan targeting users of more than 400 apps in 16 countries</description>        <pubDate>Wed, 21 Dec 2022 13:38:26</pubDate>
        <guid>https://www.group-ib.com/blog/godfather-trojan/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/godfather-3.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Scam-free Christmas</title>
        <link>https://www.group-ib.com/blog/scam-free-christmas/</link>
        <description>8 online scams to protect your customers from</description>        <pubDate>Fri, 16 Dec 2022 13:42:55</pubDate>
        <guid>https://www.group-ib.com/blog/scam-free-christmas/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/christmas.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Understanding Money Mules: The Hidden Link in Cybercrime</title>
        <link>https://www.group-ib.com/blog/money-mules/</link>
        <description>A money mule is someone who moves stolen funds across bank accounts on behalf of cybercriminals. Learn how money mules operate and how you can proactively counteract mule accounts.</description>        <pubDate>Mon, 28 Nov 2022 13:47:24</pubDate>
        <guid>https://www.group-ib.com/blog/money-mules/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/money-mules.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Hired hand: Scammers mimic Saudi manpower provider</title>
        <link>https://www.group-ib.com/blog/hired-hand/</link>
        <description>Group-IB uncovers one thousand (and one) fake domains part of a scam campaign targeting users in KSA</description>        <pubDate>Wed, 09 Nov 2022 13:54:58</pubDate>
        <guid>https://www.group-ib.com/blog/hired-hand/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/hand.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Armés et dangereux : une soif d’argent inextinguible L’APT OPERA1ER en Afrique</title>
        <link>https://www.group-ib.com/blog/opera1er-apt-fr/</link>
        <description>En 2019, l'équipe Threat Intelligence de Group-IB a détecté une série d'attaques ciblant des organisations financières en Afrique.</description>        <pubDate>Thu, 03 Nov 2022 13:30:37</pubDate>
        <guid>https://www.group-ib.com/blog/opera1er-apt-fr/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/operator-apt-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Financially motivated, dangerously activated: OPERA1ER APT in Africa</title>
        <link>https://www.group-ib.com/blog/opera1er-apt/</link>
        <description>The French-speaking gang managed to carry out over 30 successful attacks on banks, financial services and telecommunications companies, mainly located in Africa. </description>        <pubDate>Thu, 03 Nov 2022 11:26:00</pubDate>
        <guid>https://www.group-ib.com/blog/opera1er-apt/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/operator-apt.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Treasure trove. Alive and well point-of-sale malware</title>
        <link>https://www.group-ib.com/blog/majikpos-treasurehunter-malware/</link>
        <description>Analysis of months-long MajikPOS and Treasure Hunter campaign that infected dozens of terminals</description>        <pubDate>Mon, 24 Oct 2022 07:31:09</pubDate>
        <guid>https://www.group-ib.com/blog/majikpos-treasurehunter-malware/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/treasure-trove-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Deadbolt ransomware decryption: unlock your data</title>
        <link>https://www.group-ib.com/blog/deadbolt-ransomware-decryption/</link>
        <description>The Group-IB Incident Response Team investigated an incident related to a DeadBolt attack and analyzed a DeadBolt ransomware sample</description>        <pubDate>Wed, 19 Oct 2022 11:52:51</pubDate>
        <guid>https://www.group-ib.com/blog/deadbolt-ransomware-decryption/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/deadbolt.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Scam is rising</title>
        <link>https://www.group-ib.com/blog/scam-is-rising/</link>
        <description>With well-set digital marketing campaigns and professional call-centres</description>        <pubDate>Mon, 17 Oct 2022 14:19:13</pubDate>
        <guid>https://www.group-ib.com/blog/scam-is-rising/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/scamisrising.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Take control of your shadow IT</title>
        <link>https://www.group-ib.com/blog/attack-surface-management/</link>
        <description>How Group-IB Attack Surface Management ensures full mastery of your external attack surface</description>        <pubDate>Wed, 28 Sep 2022 14:13:57</pubDate>
        <guid>https://www.group-ib.com/blog/attack-surface-management/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/shadow-it.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Letting off steam</title>
        <link>https://www.group-ib.com/blog/steam/</link>
        <description>Hackers use the browser-in-the-browser technique to steal Steam accounts</description>        <pubDate>Tue, 13 Sep 2022 12:11:28</pubDate>
        <guid>https://www.group-ib.com/blog/steam/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/steam.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Roasting 0ktapus: The phishing campaign going after Okta identity credentials</title>
        <link>https://www.group-ib.com/blog/0ktapus/</link>
        <description>Over 130 organizations have been compromised in a sophisticated attack using simple phishing kits</description>        <pubDate>Thu, 25 Aug 2022 09:02:13</pubDate>
        <guid>https://www.group-ib.com/blog/0ktapus/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/oktapus-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>APT41 World Tour 2021 on a tight schedule</title>
        <link>https://www.group-ib.com/blog/apt41-world-tour-2021/</link>
        <description>4 malicious campaigns, 13 confirmed victims, and a new wave of Cobalt Strike infections</description>        <pubDate>Thu, 18 Aug 2022 08:48:58</pubDate>
        <guid>https://www.group-ib.com/blog/apt41-world-tour-2021/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/apt41.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Switching side jobs</title>
        <link>https://www.group-ib.com/blog/switching-side-jobs/</link>
        <description>Links between ATMZOW JS-sniffer and Hancitor</description>        <pubDate>Wed, 17 Aug 2022 12:14:40</pubDate>
        <guid>https://www.group-ib.com/blog/switching-side-jobs/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/switching.png" type="image/jpeg"/>
      </item>
	        <item>
        <title>Challenge accepted</title>
        <link>https://www.group-ib.com/blog/malibot/</link>
        <description>Detecting MaliBot, a fresh Android banking trojan, with a Fraud Protection solution</description>        <pubDate>Thu, 11 Aug 2022 15:39:08</pubDate>
        <guid>https://www.group-ib.com/blog/malibot/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/malibot-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Fake investment scams in Europe</title>
        <link>https://www.group-ib.com/blog/investment-scams-europe/</link>
        <description>How we almost got rich</description>        <pubDate>Fri, 29 Jul 2022 08:54:48</pubDate>
        <guid>https://www.group-ib.com/blog/investment-scams-europe/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/investment.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Under the Hood. Group-IB Managed XDR</title>
        <link>https://www.group-ib.com/blog/managed-xdr/</link>
        <description>What Group-IB’s new all-in-one solution offers: cybersecurity management, network event analysis, and lightning-fast stops to attacks</description>        <pubDate>Mon, 25 Jul 2022 11:38:45</pubDate>
        <guid>https://www.group-ib.com/blog/managed-xdr/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-14-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Group-IB introduces the Unified Risk Platform</title>
        <link>https://www.group-ib.com/blog/unified-risk-platform/</link>
        <description>Group-IB’s platform allows organizations to overcome cyber risks</description>        <pubDate>Thu, 30 Jun 2022 09:23:31</pubDate>
        <guid>https://www.group-ib.com/blog/unified-risk-platform/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/urp.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>We see you, Gozi</title>
        <link>https://www.group-ib.com/blog/gozi-latest-ttps/</link>
        <description>Hunting the latest TTPs used for delivering the Trojan</description>        <pubDate>Fri, 24 Jun 2022 15:42:35</pubDate>
        <guid>https://www.group-ib.com/blog/gozi-latest-ttps/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/gozi.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>&#8220;We find many things that others do not even see&#8221;</title>
        <link>https://www.group-ib.com/blog/rostovtsev/</link>
        <description>Nikita Rostovtsev on current cyber threats and his profession</description>        <pubDate>Thu, 16 Jun 2022 15:48:13</pubDate>
        <guid>https://www.group-ib.com/blog/rostovtsev/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-43-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Thousands of IDs exposed in yet another data breach in Brazil</title>
        <link>https://www.group-ib.com/blog/brazil-exposed-db/</link>
        <description>Unsecured public-facing database allowed anyone to access ID selfies for months</description>        <pubDate>Thu, 16 Jun 2022 13:14:03</pubDate>
        <guid>https://www.group-ib.com/blog/brazil-exposed-db/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/ids.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Swiss Army Knife Phishing</title>
        <link>https://www.group-ib.com/blog/phishing-vietnam-banks/</link>
        <description>Group-IB identifies massive campaign capable of targeting clients of major Vietnamese banks</description>        <pubDate>Thu, 09 Jun 2022 15:53:45</pubDate>
        <guid>https://www.group-ib.com/blog/phishing-vietnam-banks/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-44-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>SideWinder.AntiBot.Script</title>
        <link>https://www.group-ib.com/blog/sidewinder-antibot/</link>
        <description>APT SideWinder’s new tool that narrows their reach to Pakistan</description>        <pubDate>Wed, 01 Jun 2022 13:56:14</pubDate>
        <guid>https://www.group-ib.com/blog/sidewinder-antibot/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/sidewinder1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Old Gremlins, new methods</title>
        <link>https://www.group-ib.com/blog/oldgremlin-comeback/</link>
        <description>Russian-speaking ransomware gang OldGremlin resumes attacks in Russia</description>        <pubDate>Thu, 14 Apr 2022 11:36:16</pubDate>
        <guid>https://www.group-ib.com/blog/oldgremlin-comeback/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/oldgremlin.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Scammers make off with $1.6 million in crypto</title>
        <link>https://www.group-ib.com/blog/fake-crypto-giveaway/</link>
        <description>Fake giveaways hit bitcoiners again. Now on YouTube</description>        <pubDate>Fri, 08 Apr 2022 15:57:04</pubDate>
        <guid>https://www.group-ib.com/blog/fake-crypto-giveaway/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-5-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Mitigating Spring4Shell with Group-IB</title>
        <link>https://www.group-ib.com/blog/spring4shell/</link>
        <description>What we know about Spring4Shell so far</description>        <pubDate>Thu, 31 Mar 2022 12:05:57</pubDate>
        <guid>https://www.group-ib.com/blog/spring4shell/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/spring4shell.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Empty Box</title>
        <link>https://www.group-ib.com/blog/fake-delivery-scams-singapore/</link>
        <description>Group-IB unveils three groups of fraudsters behind delivery scams in Singapore</description>        <pubDate>Mon, 28 Mar 2022 13:33:49</pubDate>
        <guid>https://www.group-ib.com/blog/fake-delivery-scams-singapore/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-8-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Lost &#038; Found: Group-IB Unveils Attack Surface Management (ex. AssetZero)</title>
        <link>https://www.group-ib.com/blog/assetzero/</link>
        <description>Intelligence-Driven Attack Surface Management</description>        <pubDate>Tue, 15 Mar 2022 13:56:22</pubDate>
        <guid>https://www.group-ib.com/blog/assetzero/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/asm-blog.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Top 5 recommendations for preventing ransomware for 2022</title>
        <link>https://www.group-ib.com/blog/5-ransomware-tips/</link>
        <description>With ransomware attacks on the rise, companies need to take a proactive approach to security. Group-IB has put together a list of actionable tips to help you protect your organization from the ransomware threats in 2022.</description>        <pubDate>Fri, 18 Feb 2022 11:59:04</pubDate>
        <guid>https://www.group-ib.com/blog/5-ransomware-tips/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/5-ransomware-tips-1.webp" type="image/jpeg"/>
      </item>
	        <item>
        <title>Cleaning the atmosphere</title>
        <link>https://www.group-ib.com/blog/atmosphere/</link>
        <description>Weak points in modern-day corporate email security</description>        <pubDate>Mon, 07 Feb 2022 13:37:50</pubDate>
        <guid>https://www.group-ib.com/blog/atmosphere/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-14.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Shedding light on the dark web</title>
        <link>https://www.group-ib.com/blog/ml-in-investigations/</link>
        <description>Cybersecurity analyst's guide on how to use machine learning to show cybercriminals' true colors</description>        <pubDate>Fri, 28 Jan 2022 13:42:08</pubDate>
        <guid>https://www.group-ib.com/blog/ml-in-investigations/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-51-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Mitigating Log4Shell in Log4j with Group-IB</title>
        <link>https://www.group-ib.com/blog/log4shell/</link>
        <description> Group-IB's recommendations to mitigate this vulnerability and protect your organization.</description>        <pubDate>Thu, 23 Dec 2021 14:01:16</pubDate>
        <guid>https://www.group-ib.com/blog/log4shell/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/log4shell.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>How MITRE ATT&#038;CK® helps users of Threat Intelligence</title>
        <link>https://www.group-ib.com/blog/tia-mitre/</link>
        <description></description>        <pubDate>Thu, 23 Dec 2021 13:51:31</pubDate>
        <guid>https://www.group-ib.com/blog/tia-mitre/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-37-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Ready-made fraud</title>
        <link>https://www.group-ib.com/blog/target/</link>
        <description>Behind the scenes of targeted scams</description>        <pubDate>Tue, 21 Dec 2021 14:05:05</pubDate>
        <guid>https://www.group-ib.com/blog/target/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-30-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Inside the Hive</title>
        <link>https://www.group-ib.com/blog/hive/</link>
        <description>Deep dive into Hive RaaS, analysis of latest samples</description>        <pubDate>Thu, 09 Dec 2021 12:57:59</pubDate>
        <guid>https://www.group-ib.com/blog/hive/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/hive.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>The Darker Things</title>
        <link>https://www.group-ib.com/blog/blackmatter2/</link>
        <description>BlackMatter and their victims</description>        <pubDate>Wed, 03 Nov 2021 14:16:14</pubDate>
        <guid>https://www.group-ib.com/blog/blackmatter2/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-69-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Cannibal Carders</title>
        <link>https://www.group-ib.com/blog/cannibal-carders-fake-shops/</link>
        <description>Group-IB uncovers largest networks of fake shops – phishing websites disguised as card shops</description>        <pubDate>Thu, 28 Oct 2021 14:19:19</pubDate>
        <guid>https://www.group-ib.com/blog/cannibal-carders-fake-shops/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-70-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Scamdemic outbreak</title>
        <link>https://www.group-ib.com/blog/middle-east-scam/</link>
        <description>Scammers attack users in Middle Eastern countries</description>        <pubDate>Fri, 17 Sep 2021 14:30:10</pubDate>
        <guid>https://www.group-ib.com/blog/middle-east-scam/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-50-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>RUNLIR &#8211; phishing campaign targeting Netherlands</title>
        <link>https://www.group-ib.com/blog/runlir/</link>
        <description>Phishers take an approach to bypass security controls never seen in the country</description>        <pubDate>Thu, 16 Sep 2021 14:26:56</pubDate>
        <guid>https://www.group-ib.com/blog/runlir/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-38-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Under the hood. Group-IB Threat Intelligence. Part 2</title>
        <link>https://www.group-ib.com/blog/tailored-threat-intel/</link>
        <description>How we make Tailored Threat Intelligence</description>        <pubDate>Fri, 13 Aug 2021 14:33:02</pubDate>
        <guid>https://www.group-ib.com/blog/tailored-threat-intel/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-37-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Bold ad campaign</title>
        <link>https://www.group-ib.com/blog/awc/</link>
        <description>AWC joins illicit carding business by offering 1 Mln compromised cards for free</description>        <pubDate>Fri, 06 Aug 2021 14:36:52</pubDate>
        <guid>https://www.group-ib.com/blog/awc/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-75-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>It&#8217;s alive!</title>
        <link>https://www.group-ib.com/blog/blackmatter-ransomware/</link>
        <description>The story behind the BlackMatter ransomware strain</description>        <pubDate>Fri, 06 Aug 2021 07:28:37</pubDate>
        <guid>https://www.group-ib.com/blog/blackmatter-ransomware/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-66-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Prometheus TDS</title>
        <link>https://www.group-ib.com/blog/prometheus-tds/</link>
        <description>The key to success for Campo Loader, Hancitor, IcedID, and QBot</description>        <pubDate>Thu, 05 Aug 2021 12:39:35</pubDate>
        <guid>https://www.group-ib.com/blog/prometheus-tds/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/prometheus.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>The Art of Cyberwarfare</title>
        <link>https://www.group-ib.com/blog/task/</link>
        <description>Chinese APTs attack Russia</description>        <pubDate>Tue, 03 Aug 2021 07:33:23</pubDate>
        <guid>https://www.group-ib.com/blog/task/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-36-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Under the hood. Group-IB Threat Intelligence. Part 1</title>
        <link>https://www.group-ib.com/blog/gib-tia-db/</link>
        <description>Dive into Breached DB section</description>        <pubDate>Thu, 29 Jul 2021 07:42:49</pubDate>
        <guid>https://www.group-ib.com/blog/gib-tia-db/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-37-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>The Fraud Family</title>
        <link>https://www.group-ib.com/blog/fraud-family-nl/</link>
        <description>Fraud-as-a-Service operation targeting Dutch residents</description>        <pubDate>Thu, 22 Jul 2021 07:45:28</pubDate>
        <guid>https://www.group-ib.com/blog/fraud-family-nl/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-10-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>The Brothers Grim</title>
        <link>https://www.group-ib.com/blog/grimagent/</link>
        <description>The reversing tale of GrimAgent malware used by Ryuk</description>        <pubDate>Fri, 02 Jul 2021 07:51:15</pubDate>
        <guid>https://www.group-ib.com/blog/grimagent/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-59-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>REvil Twins: Ransomware-as-a-Service program</title>
        <link>https://www.group-ib.com/blog/revil-raas/</link>
        <description>Deep Dive into Prolific RaaS Affiliates' TTPs</description>        <pubDate>Wed, 30 Jun 2021 08:05:56</pubDate>
        <guid>https://www.group-ib.com/blog/revil-raas/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-42-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Big airline heist</title>
        <link>https://www.group-ib.com/blog/colunmtk-apt41/</link>
        <description>APT41 likely behind a third-party attack on Air India</description>        <pubDate>Thu, 10 Jun 2021 09:26:10</pubDate>
        <guid>https://www.group-ib.com/blog/colunmtk-apt41/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/airline-heist.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>FontPack: A dangerous update</title>
        <link>https://www.group-ib.com/blog/fontpack/</link>
        <description>Attribution secrets: Who is behind stealing credentials and bank card data by asking to install fake Flash Player, browser or font updates?</description>        <pubDate>Thu, 03 Jun 2021 08:14:27</pubDate>
        <guid>https://www.group-ib.com/blog/fontpack/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-15-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>BlackCat Ransomware: Tactics, Techniques &#038; Mitigation Strategies</title>
        <link>https://www.group-ib.com/blog/blackcat/</link>
        <description>An analysis of the BlackCat ransomware affiliate program</description>        <pubDate>Fri, 14 May 2021 09:09:38</pubDate>
        <guid>https://www.group-ib.com/blog/blackcat/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/fatcat.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Connecting the Bots</title>
        <link>https://www.group-ib.com/blog/hancitor-cuba-ransomware/</link>
        <description>Hancitor fuels Cuba Ransomware Operations</description>        <pubDate>Fri, 07 May 2021 08:17:59</pubDate>
        <guid>https://www.group-ib.com/blog/hancitor-cuba-ransomware/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-55-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>GrelosGTM group abuses Google Tag Manager to attack e-commerce websites</title>
        <link>https://www.group-ib.com/blog/grelosgtm/</link>
        <description>Group-IB specialists detected GrelosGTM group started to abuse Google Tag Manager legitimate functionality for their own purposes in infections of online shops.</description>        <pubDate>Thu, 06 May 2021 08:21:54</pubDate>
        <guid>https://www.group-ib.com/blog/grelosgtm/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-58-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Lazarus BTC Changer</title>
        <link>https://www.group-ib.com/blog/btc-changer/</link>
        <description>Back in action with JS sniffers redesigned to steal crypto</description>        <pubDate>Wed, 14 Apr 2021 08:29:32</pubDate>
        <guid>https://www.group-ib.com/blog/btc-changer/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-67-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Deep water: exploring phishing kits</title>
        <link>https://www.group-ib.com/blog/phishing-kits/</link>
        <description>Group-IB's Computer Emergency Response Team built a solid phishing kit database, which helps Group-IB fight phishing that targets specific brands.</description>        <pubDate>Mon, 12 Apr 2021 08:30:15</pubDate>
        <guid>https://www.group-ib.com/blog/phishing-kits/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-23-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>When Karma Comes Back</title>
        <link>https://www.group-ib.com/blog/swarmshop/</link>
        <description>The rise and fall of illicit cardshop breached twice in two years</description>        <pubDate>Thu, 08 Apr 2021 08:42:10</pubDate>
        <guid>https://www.group-ib.com/blog/swarmshop/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-29-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Kremlin RATs from Nigeria</title>
        <link>https://www.group-ib.com/blog/rats-nigeria/</link>
        <description>The analysis of phishing campaigns carried out by a new threat actor</description>        <pubDate>Mon, 05 Apr 2021 08:45:48</pubDate>
        <guid>https://www.group-ib.com/blog/rats-nigeria/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-25-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Masters of disguise</title>
        <link>https://www.group-ib.com/blog/bootkits/</link>
        <description>Let's hunt some bootkits</description>        <pubDate>Wed, 17 Mar 2021 08:49:43</pubDate>
        <guid>https://www.group-ib.com/blog/bootkits/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-2-2.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>JavaScript sniffers&#8217; new tricks</title>
        <link>https://www.group-ib.com/blog/e1rb/</link>
        <description>Analysis of the E1RB JS sniffer family</description>        <pubDate>Mon, 15 Mar 2021 08:52:50</pubDate>
        <guid>https://www.group-ib.com/blog/e1rb/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-7-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Inside Classiscam</title>
        <link>https://www.group-ib.com/blog/classiscam/</link>
        <description>A deep dive into Classiscam: automated scam as a service designed to steal money and payment data</description>        <pubDate>Mon, 01 Mar 2021 09:02:38</pubDate>
        <guid>https://www.group-ib.com/blog/classiscam/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-73-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>The source of everything</title>
        <link>https://www.group-ib.com/blog/gitlab-jenkins-forensics/</link>
        <description>Forensic examination of incidents involving source code leaks</description>        <pubDate>Tue, 26 Jan 2021 09:13:04</pubDate>
        <guid>https://www.group-ib.com/blog/gitlab-jenkins-forensics/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-13-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>New attacks by UltraRank group</title>
        <link>https://www.group-ib.com/blog/ultrarank/</link>
        <description>As part of UltraRank's new campaign, Group-IB Threat Intelligence team discovered 12 eCommerce websites infected with their JavaScript-sniffer.</description>        <pubDate>Wed, 23 Dec 2020 09:19:08</pubDate>
        <guid>https://www.group-ib.com/blog/ultrarank/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-34-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>The footprints of Raccoon</title>
        <link>https://www.group-ib.com/blog/fakesecurity-raccoon/</link>
        <description>A story about operators of JS-sniffer FakeSecurity distributing Raccoon stealer</description>        <pubDate>Mon, 07 Dec 2020 09:23:16</pubDate>
        <guid>https://www.group-ib.com/blog/fakesecurity-raccoon/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-6-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>The Locking Egregor</title>
        <link>https://www.group-ib.com/blog/egregor/</link>
        <description>Analysis of TTPs employed by Egregor operators</description>        <pubDate>Fri, 20 Nov 2020 13:34:07</pubDate>
        <guid>https://www.group-ib.com/blog/egregor/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-64-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Big Game Hunting: Now in Russia</title>
        <link>https://www.group-ib.com/blog/oldgremlin/</link>
        <description>Top Russian companies and banks under attack from OldGremlin - a group controlling TinyCryptor ransomware</description>        <pubDate>Sun, 01 Nov 2020 13:38:20</pubDate>
        <guid>https://www.group-ib.com/blog/oldgremlin/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-47-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Group-IB Fraud Protection (ex. Fraud Hunting Platform)</title>
        <link>https://www.group-ib.com/blog/fhp/</link>
        <description>Keeping user digital identity safe</description>        <pubDate>Sat, 10 Oct 2020 13:41:46</pubDate>
        <guid>https://www.group-ib.com/blog/fhp/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-14-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Lock Like a Pro</title>
        <link>https://www.group-ib.com/blog/prolock-evolution/</link>
        <description>Dive in Recent ProLock's Big Game Hunting</description>        <pubDate>Thu, 10 Sep 2020 13:46:02</pubDate>
        <guid>https://www.group-ib.com/blog/prolock-evolution/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-22-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Digital forensics specialist&#8217;s bookshelf</title>
        <link>https://www.group-ib.com/blog/shelf/</link>
        <description>Top 11 books on digital forensics, incident response, and malware analysis</description>        <pubDate>Sun, 05 Jul 2020 13:51:07</pubDate>
        <guid>https://www.group-ib.com/blog/shelf/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/bookshelf.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>IcedID: new malware version</title>
        <link>https://www.group-ib.com/blog/icedid/</link>
        <description>When ice burns through bank accounts</description>        <pubDate>Fri, 29 May 2020 13:54:50</pubDate>
        <guid>https://www.group-ib.com/blog/icedid/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-53-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>ATT&#038;CKing ProLock Ransomware</title>
        <link>https://www.group-ib.com/blog/prolock/</link>
        <description>The success of enterprise ransomware attacks has motivated more and more threat actors to join the game.</description>        <pubDate>Thu, 14 May 2020 14:09:41</pubDate>
        <guid>https://www.group-ib.com/blog/prolock/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-24-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>PerSwaysion Campaign</title>
        <link>https://www.group-ib.com/blog/perswaysion/</link>
        <description>Playbook of Microsoft Document Sharing-Based Phishing Attack</description>        <pubDate>Thu, 30 Apr 2020 14:12:30</pubDate>
        <guid>https://www.group-ib.com/blog/perswaysion/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-48-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Reconstructing User Activity for Forensics with FeatureUsage</title>
        <link>https://www.group-ib.com/blog/featureusage/</link>
        <description>Useful feature that can help forensic analysts and incident responders to reconstruct user activities.</description>        <pubDate>Tue, 28 Apr 2020 14:27:05</pubDate>
        <guid>https://www.group-ib.com/blog/featureusage/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-11-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Chromium-based Microsoft Edge from a Forensic Point of View</title>
        <link>https://www.group-ib.com/blog/forensics-edge/</link>
        <description>Explore the forensic perspective of the Microsoft Edge Chromium-based version and its features, such as msedge_proxy, edge cache location, and more.</description>        <pubDate>Thu, 20 Feb 2020 09:13:30</pubDate>
        <guid>https://www.group-ib.com/blog/forensics-edge/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/forensics-edge.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Hunting for Nextcloud Cloud Storage Forensic Artifacts on Endpoints</title>
        <link>https://www.group-ib.com/blog/nextcloud/</link>
        <description>Forensic artifacts, which can be found during forensic examination of a Windows endpoint.</description>        <pubDate>Fri, 17 Jan 2020 14:32:26</pubDate>
        <guid>https://www.group-ib.com/blog/nextcloud/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-46-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>A Shortcut to Compromise: Cobalt Gang phishing campaign</title>
        <link>https://www.group-ib.com/blog/cobaltphishing/</link>
        <description>Cobalt Gang is alive and well, and continued to attack financial institutions around the globe in 2019.</description>        <pubDate>Fri, 20 Dec 2019 14:35:41</pubDate>
        <guid>https://www.group-ib.com/blog/cobaltphishing/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-68-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Hunting for Attacker&#8217;s Tactics and Techniques With Prefetch Files</title>
        <link>https://www.group-ib.com/blog/hunting-for-ttps-with-prefetch-files/</link>
        <description>Windows Prefetch files were introduced in Windows XP and since that time have helped digital forensics analysts and incident responders find evidence of execution.</description>        <pubDate>Wed, 11 Dec 2019 14:37:40</pubDate>
        <guid>https://www.group-ib.com/blog/hunting-for-ttps-with-prefetch-files/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-56-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Group-IB unveils its Graph</title>
        <link>https://www.group-ib.com/blog/graph-network-analysis/</link>
        <description>The story about Group-IB searching for graph analysis solution and creating its own unique instrument</description>        <pubDate>Mon, 18 Nov 2019 14:41:18</pubDate>
        <guid>https://www.group-ib.com/blog/graph-network-analysis/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-60-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Massive malicious campaign by FakeSecurity JS-sniffer</title>
        <link>https://www.group-ib.com/blog/fakesecurity/</link>
        <description>Group-IB specialists detected a new JS-sniffer family called FakeSecurity.</description>        <pubDate>Fri, 08 Nov 2019 14:52:40</pubDate>
        <guid>https://www.group-ib.com/blog/fakesecurity/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-9-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>WhatsApp in Plain Sight: Where and How You Can Collect Forensic Artifacts</title>
        <link>https://www.group-ib.com/blog/whatsapp-forensic-artifacts/</link>
        <description>All about WhatsApp forensics and the wealth of data extracted from a device through forensic analysis.</description>        <pubDate>Thu, 07 Nov 2019 12:14:04</pubDate>
        <guid>https://www.group-ib.com/blog/whatsapp-forensic-artifacts/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/whatsapp.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>RDoS attacks by fake Fancy Bear hit banks in multiple locations</title>
        <link>https://www.group-ib.com/blog/fakeapt28/</link>
        <description>Group-IB experts have detected a massive email campaign spreading similar ransom demands sent to banks and financial organizations across the word.</description>        <pubDate>Tue, 05 Nov 2019 14:43:51</pubDate>
        <guid>https://www.group-ib.com/blog/fakeapt28/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-63-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>No Time to Waste</title>
        <link>https://www.group-ib.com/blog/windows10-timeline-for-forensics/</link>
        <description>How Windows 10 Timeline Can Help Forensic Experts</description>        <pubDate>Fri, 04 Oct 2019 13:23:40</pubDate>
        <guid>https://www.group-ib.com/blog/windows10-timeline-for-forensics/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/wind10.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>50 Shades of Ransomware</title>
        <link>https://www.group-ib.com/blog/troldesh/</link>
        <description></description>        <pubDate>Mon, 30 Sep 2019 14:46:13</pubDate>
        <guid>https://www.group-ib.com/blog/troldesh/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-32-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Tools up: the best software and hardware tools for computer forensics</title>
        <link>https://www.group-ib.com/blog/digital-forensics-tools/</link>
        <description>Igor Mikhailov gave his review of the best software and hardware solutions for computer forensics.</description>        <pubDate>Thu, 26 Sep 2019 09:56:39</pubDate>
        <guid>https://www.group-ib.com/blog/digital-forensics-tools/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/tools.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Voting results of &#8220;The Voice Kids Russia Season 6&#8221;</title>
        <link>https://www.group-ib.com/blog/voice-kids-investigation/</link>
                <pubDate>Tue, 11 Jun 2019 13:36:33</pubDate>
        <guid>https://www.group-ib.com/blog/voice-kids-investigation/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/voice-kids-investigation-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Catching fish in muddy waters</title>
        <link>https://www.group-ib.com/blog/muddywater/</link>
        <description>How the hacker group MuddyWater attacked a Turkish manufacturer of military electronics</description>        <pubDate>Wed, 29 May 2019 07:08:27</pubDate>
        <guid>https://www.group-ib.com/blog/muddywater/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-1-4.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Following the RTM</title>
        <link>https://www.group-ib.com/blog/rtm/</link>
        <description>Forensic examination of a computer infected with a banking trojan</description>        <pubDate>Wed, 08 May 2019 14:48:55</pubDate>
        <guid>https://www.group-ib.com/blog/rtm/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-28-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Meet the JS-Sniffers 4: CoffeMokko Family</title>
        <link>https://www.group-ib.com/blog/coffemokko/</link>
        <description>Group-IB researchers have discovered 38 families of JS-sniffers, whereas only 12 were known previously.</description>        <pubDate>Fri, 26 Apr 2019 14:58:46</pubDate>
        <guid>https://www.group-ib.com/blog/coffemokko/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-71-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Meet the JS-Sniffers 3: Illum Family</title>
        <link>https://www.group-ib.com/blog/illum/</link>
        <description>Group-IB researchers discovered Illum JS-sniffers family designed to steal payment data of customers of online stores.</description>        <pubDate>Thu, 25 Apr 2019 15:16:26</pubDate>
        <guid>https://www.group-ib.com/blog/illum/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-54-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Meet the JS-Sniffers 2: G-Analytics Family</title>
        <link>https://www.group-ib.com/blog/g-analytics/</link>
        <description>Group-IB discovered that the stolen payment cards data is sold through an underground store specially created for this purpose.</description>        <pubDate>Fri, 19 Apr 2019 15:18:52</pubDate>
        <guid>https://www.group-ib.com/blog/g-analytics/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-12-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Meet the JS-Sniffers: ReactGet Family</title>
        <link>https://www.group-ib.com/blog/reactget/</link>
        <description>ReactGet is one of the most interesting families of JS-sniffers, designed to steal banking cards data from online stores.</description>        <pubDate>Tue, 09 Apr 2019 15:22:28</pubDate>
        <guid>https://www.group-ib.com/blog/reactget/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-26-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Gustuff: Weapon of Mass Infection</title>
        <link>https://www.group-ib.com/blog/gustuff/</link>
        <description>Android Trojan named «Gustuff» capable of targeting more than 100 global banking apps, a number of cryptocurrency and marketplace applications</description>        <pubDate>Thu, 04 Apr 2019 15:25:41</pubDate>
        <guid>https://www.group-ib.com/blog/gustuff/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-57-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>The end of torrents era in Russia</title>
        <link>https://www.group-ib.com/blog/torrents/</link>
        <description>Currently, a total of 80% of pirated films and almost 90% of TV series are being watched online</description>        <pubDate>Tue, 05 Feb 2019 13:28:56</pubDate>
        <guid>https://www.group-ib.com/blog/torrents/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-31-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Silence: Moving into the Darkside</title>
        <link>https://www.group-ib.com/blog/silence/</link>
        <description>Group-IB has exposed the attacks committed by Silence cybercriminal group.</description>        <pubDate>Wed, 05 Sep 2018 11:51:50</pubDate>
        <guid>https://www.group-ib.com/blog/silence/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-40-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Cobalt Renaissance</title>
        <link>https://www.group-ib.com/blog/renaissance/</link>
        <description>New attacks and joint operations</description>        <pubDate>Tue, 29 May 2018 11:56:52</pubDate>
        <guid>https://www.group-ib.com/blog/renaissance/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-27-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>MoneyTaker: in pursuit of the invisible</title>
        <link>https://www.group-ib.com/blog/moneytaker/</link>
        <description>Group-IB has uncovered a hacker group attacking banks in the USA and Russia</description>        <pubDate>Mon, 11 Dec 2017 12:12:33</pubDate>
        <guid>https://www.group-ib.com/blog/moneytaker/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-20-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>When Hackers are Quicker than Antiviruses: Cobalt Group Bypasses Antivirus Protection</title>
        <link>https://www.group-ib.com/blog/antivirus/</link>
                <pubDate>Mon, 27 Nov 2017 08:39:32</pubDate>
        <guid>https://www.group-ib.com/blog/antivirus/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/antivirus-small.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>In a Queue for a Scam</title>
        <link>https://www.group-ib.com/blog/hype/</link>
        <description>How faudsters cash in on hype around new iPhones</description>        <pubDate>Thu, 02 Nov 2017 13:04:07</pubDate>
        <guid>https://www.group-ib.com/blog/hype/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-52-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>NotPetya pulls BadRabbit out of the hat</title>
        <link>https://www.group-ib.com/blog/reportbadrabbit/</link>
        <description>Research revealed that the BadRabbit code was compiled from NotPetya sources.</description>        <pubDate>Thu, 26 Oct 2017 12:15:33</pubDate>
        <guid>https://www.group-ib.com/blog/reportbadrabbit/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-41-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>BadRabbit: spread of new cryptolocker</title>
        <link>https://www.group-ib.com/blog/badrabbit/</link>
        <description>There is a connection between BadRabbit and Not Petya</description>        <pubDate>Tue, 24 Oct 2017 12:22:35</pubDate>
        <guid>https://www.group-ib.com/blog/badrabbit/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-76-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>&#8216;Black spot&#8217; for pirates</title>
        <link>https://www.group-ib.com/blog/black-label/</link>
        <description>Russia has developed a strong legal framework to combat online piracy. All that is needed is for it to be used effectively (especially for Forbes.ru)</description>        <pubDate>Thu, 19 Oct 2017 13:13:01</pubDate>
        <guid>https://www.group-ib.com/blog/black-label/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-1-3.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Airline companies «landing» on fake pages</title>
        <link>https://www.group-ib.com/blog/avia/</link>
        <description>Top global airline companies have been compromised by fraudsters for the second time during the last six months.</description>        <pubDate>Tue, 26 Sep 2017 13:20:39</pubDate>
        <guid>https://www.group-ib.com/blog/avia/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-65-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Secrets of Cobalt</title>
        <link>https://www.group-ib.com/blog/cobalt/</link>
        <description>How Cobalt hackers bypass your defenses</description>        <pubDate>Tue, 15 Aug 2017 12:25:00</pubDate>
        <guid>https://www.group-ib.com/blog/cobalt/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-3-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Insecure venture</title>
        <link>https://www.group-ib.com/blog/venture/</link>
        <description>On the price of hacker attacks and the toxic cyber environment</description>        <pubDate>Thu, 10 Aug 2017 13:36:47</pubDate>
        <guid>https://www.group-ib.com/blog/venture/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-77.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Kronos devouring its children</title>
        <link>https://www.group-ib.com/blog/kronos/</link>
        <description>The man who "saved the world" from the WannaCry outbreak has been arrested on suspicion of being the author of Kronos banking Trojan</description>        <pubDate>Fri, 04 Aug 2017 13:34:07</pubDate>
        <guid>https://www.group-ib.com/blog/kronos/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-19-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Hacktivists unmasked</title>
        <link>https://www.group-ib.com/blog/uicf/</link>
        <description>Group-IB reveals the identity of alleged members of the Islamic hacker group United Islamic Cyber Force</description>        <pubDate>Wed, 02 Aug 2017 12:29:17</pubDate>
        <guid>https://www.group-ib.com/blog/uicf/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-33-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Targeted attacks on banks</title>
        <link>https://www.group-ib.com/blog/polygon/</link>
        <description>Russia as a testing ground</description>        <pubDate>Mon, 24 Jul 2017 13:40:11</pubDate>
        <guid>https://www.group-ib.com/blog/polygon/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-45-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Petya starts with Ukraine and then goes global</title>
        <link>https://www.group-ib.com/blog/petya/</link>
        <description>Group-IB has identified the ransomware that has infected energy, telecommunications and financial companies</description>        <pubDate>Tue, 27 Jun 2017 12:32:23</pubDate>
        <guid>https://www.group-ib.com/blog/petya/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-21-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Ghost flights</title>
        <link>https://www.group-ib.com/blog/fake/</link>
        <description>Top global airline companies have been compromised through fake links distributed by "friends" on Facebook</description>        <pubDate>Mon, 05 Jun 2017 13:24:11</pubDate>
        <guid>https://www.group-ib.com/blog/fake/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-62-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>LAZARUS ARISEN</title>
        <link>https://www.group-ib.com/blog/lazarus/</link>
        <description>Group-IB reveals the unknown details of attacks from one of the most notorious APT groups: sophisticated espionage and APT techniques of the North Korean state-sponsored hackers</description>        <pubDate>Tue, 30 May 2017 12:51:19</pubDate>
        <guid>https://www.group-ib.com/blog/lazarus/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-49-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Echoes of cyberwar</title>
        <link>https://www.group-ib.com/blog/echoes/</link>
        <description>Why WannaCry was more dangerous than other ransomware?</description>        <pubDate>Thu, 11 May 2017 13:43:43</pubDate>
        <guid>https://www.group-ib.com/blog/echoes/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-61-1.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>In a Risk Group</title>
        <link>https://www.group-ib.com/blog/hurricane/</link>
        <description>Why cyberattacks may be soon at the top of the World rating of threats (Ilya Sachkov for RBC)</description>        <pubDate>Mon, 23 Jan 2017 12:06:40</pubDate>
        <guid>https://www.group-ib.com/blog/hurricane/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/hurricane.jpg" type="image/jpeg"/>
      </item>
	        <item>
        <title>Cron has fallen</title>
        <link>https://www.group-ib.com/blog/cron/</link>
        <description>Group-IB supports operations to arrest gang for infecting 1 million smartphones</description>        <pubDate>Wed, 13 Jan 2016 12:55:31</pubDate>
        <guid>https://www.group-ib.com/blog/cron/</guid>
        <enclosure url="https://www.group-ib.com/wp-content/uploads/img-1440-4-1.jpg" type="image/jpeg"/>
      </item>
	  	</channel>
</rss>