Threat Intelligence

Threat Intelligence

Supercharge security and defeat attacks before they begin with knowledge of how and when you will be attacked

Modules

Group-IB Threat Intelligence is modular and flexible, allowing you to gather the intelligence you need how and when you need it.

Threats

Cyber criminals

Nation-state actors

Ransomware DLS

Threat landscape

Threat bulletins

Analyst repots

Compromises

Accounts

IMEI

Public leaks

Git leaks

Breached databases

Dark Web

Underground forums

Underground markets

Instant messengers

Banking

Bank cards

Card shops feeds

Mules

Suspicious IP

Tor nodes

Open proxy IP lists

Socks proxy IP lists

Scanning IP

VPN exit nodes

Malware

Malware profiles

Malware detonation

Malware configuration files

Extracted phishing kits

Vulnerabilities

Attacks

DDoS attacks

Suspicious URL feed

Defaced websites

Graph

Graph Analysis

Services

Features
Threats
Dark web
Suspicious IP
Malware
Attacks
Graph
Compromises
Banking

Service desk

Onboarding training

Unlimited number of Hunting rules

Unlimited number of users

Unlimited API access

Custom integration support

Monthly intelligence briefing

Automated Intelligence reports

Group-IB Investigation Services

Opt for threat intelligence to thwart the threat actors targeting your business
Talk to sales

Managed
Threat Intelligence services

Threat Intelligence Specialist Service

This specialized offering enables you to submit requests to our seasoned threat intelligence researchers, skilled in analyzing and interpreting complex threat landscapes.

Malware Reverse Engineering
Threat Enrichment
Ransomware Data Analysis
Threat Actor Interaction
Vulnerability Assessment
Email Analysis
Custom RFIs
Talk to sales
Comprehensive Dark Web Feed Monitoring Service

Our Threat Intelligence analysts develop intricate threat hunting rules that are applicable across all sections of the Dark Web.

Regular monitoring of forum feeds
Customized reports with threat details and potential impacts
Proactive risk mitigation
Talk to sales
Anti-Scam & Anti-Phishing Service

Violations and risks monitoring
Assistance with investigations
Facilitation of effective takedowns
Talk to sales

Courses

Develop your inhouse cybersecurity competencies to operate effectively and protect your company from cyber threats.

Blue Team Analyst
Blue Team Analyst
Learn how to monitor for IS incidents, detect threats, eliminate false positives, and perform initial incident response.
On-Prem workshop
Duration - 3 days
Online workshop
Up to 12 person
Learn more
Threat Intelligence Analyst
Threat Intelligence Analyst
Learn how to collect actionable intel and interpret the data for effective incident response and attacker attribution.
On-Prem workshop
Duration - 3 days
Online workshop
Up to 12 person
Learn more