- Security Assessment
- Red Teaming
- Compliance Audit
- Pre-IR Assessment
- Compromise Assessment
- Cyber Education
- GIB Crypto
Three times the amount of theft from targeted attacks on banks, as compared with the previous reporting period
A dramatic increase in the risk of attacks on critical industrial infrastructure
Growth in DDoS extortion including attacks using IoT devices
Attackers are increasingly active in traffic interception and cyber espionage. This is primarily through vulnerabilities at telecom operators and Internet providers.
How banks in and outside Russia are attacked and by whom
How the cryptolocker market is evolving
How threat actors conduct the most popular attacks on Android users
Brand abuse schemes
From investigating complex cybercrimes and collecting threat data from hundreds of sources over the past year, Group-IB specialists have recorded the evolution of cyber-crime and the tools employed. Our Annual Report is an overview of these observations, along with analysis of key threats targeting businesses and governments, as well as forecasts for their development.
This report allows you to tailor your IT security strategy to meet incoming threats in the coming year. This is of particular importance to the banking and industrials sector as well as critical infrastructure protection specialists.
Group-IB’s status has been confirmed by Gartner — in 2015 Group-IB was included in the top 7 global vendors of threat intelligence.
CEO, Founder Group-IB
Group-IB’s security ecosystem provides comprehensive protection for your IT infrastructure based on our unique cyber intelligence and deep analysis of attacks and incident response.
Аctionable, finished intelligence to track actors and prevent attacks before they happen
Comprehensive solution to protect corporate network, hunt for threats and respond to even the most complex cyber attacks
Client-side digital identity protection and fraud prevention in real time
Al-driven online platform for external digital risk identification and migration
The well-known complete guide to the latest tactics, techniques, and procedures of ransomware operators based on MITRE ATT&CK®