
Get 24/7 incident response assistance from our global team
- APAC: +65 3159 4398
- EU & NA: +31 20 890 55 59
- MEA: +971 4 540 6400
Get 24/7 incident response assistance from our global team
Please review the following rules before submitting your application:
1. Our main objective is to foster a community of like-minded individuals dedicated to combatting cybercrime and who have never engaged in Blackhat activities.
2. All applications must include research or a research draft. You can find content criteria in the blog. Please provide a link to your research or research draft using the form below.

Reconnaissance serves a dual purpose—both as an offensive and defensive strategy—making it a crucial component in the processes of planning and defending against cyberattacks, respectively. Group-IB’s team of pen-testers have crafted an in-depth reconnaissance handbook for system administrators and security professionals seeking to effectively employ the technique and gain the upper hand against adversaries.
Discover how the powerful dynamic of manual intervention and automation tools can help identify your attack surface, including unutilized and vulnerable assets, as well as shadow IT that can pose significant risks.
Gain all the necessary details for performing reconnaissance to trace all intrusion vectors within your network and prevent the uninvited and destructive consequences of security incidents. Additionally, if you’re ready to take the next steps toward activating a robust strategy for end-to-end cybersecurity, our experts are here to help.