SecurityHQ enhances threat and risk intelligence with Group-IB

October 2024 News & Events

As a global cybersecurity company, SecurityHQ relies on intelligence from multiple sources to provide its services and protection to clients. Recently, it was announced that Group-IB, a creator of cybersecurity technologies, signed a global partnership agreement with SecurityHQ.

With this partnership, SecurityHQ will use Group-IB’s threat intelligence, attack surface management, and digital risk protection to optimise its global security operation centres (SOCs), as well as fraud protection services as part of its portfolio to enhance the defences for its financial services customers.

“This collaboration is a step forward in advancing global cybersecurity efforts. By integrating our solutions in attack surface management, threat intelligence, and digital risk protection with SecurityHQ’s expertise and operational reach, we are enhancing the capabilities of security operation centres (SOCs) worldwide,” says Vladimir Goliashev, Director of MSSP and MDR of Group-IB.

What this means for SecurityHQ

Some of the greatest benefits of threat and risk intelligence, enhanced with Group-IB data, include:

1. Attack surface management: Receive actionable insights to improve security posture with continuous external attack surface management.

2. Visual graph analysis: The graph tool can visually showcase your external attack surface by detecting existing or potential threats.

3. Dark web database access: Gain access to the industry’s most comprehensive dark web database, encompassing forums, card shops, markets, and instant messaging platforms.

4. Telegram and Discord chatter review: Gain access to a database of Telegram and Discord channels, including hacking forums, marketplaces, and hacktivist groups.

5. Track activity and attribution: Stay ahead of cyberthreats with comprehensive tracking of cybercriminal and nation-state actor activities.

6. Malware and vulnerability insights: Group-IB’s continuous research into thousands of malicious files allows for extracting configuration files from live malware collected through honeypot infrastructure, incident response efforts, and botnet tracking.

7. Malware sandbox gain: Access to a malware detonation sandbox to analyse malicious code in a controlled, isolated environment, offering comprehensive detection of various malware types.

8. Compromised data detection: Discover compromised credentials, including VIP’s personal accounts, payment card information, and breach databases before they are used to launch attacks or cause financial damage. Alerts within Group-IB Threat Intelligence can be created to inform you whenever the unified risk platform discovers a compromise for your organisation.

9. Account compromise: Discover compromised accounts for domain users.

10. Open-source code repositories: Threat actors often search public repositories as part of their reconnaissance to achieve initial access. Discover sensitive information such as logins and passwords, AWS access keys, API keys, and bank card data.

11. Public leak sites: Detect data leakage on public leak sites such as Pastebin and Ghostbin. Identify leaked data such as exported tables from databases, code fragments, usernames, passwords, bank card details, Trojan configuration files, and attack outputs.

For more information, contact SecurityHQ Southern Africa, +27 11 702 8555, [email protected], www.securityhq.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
From the Editor's desk: The good, the bad, and the victims
Technews Publishing News & Events
When the Internet first arrived, everyone was expecting amazing things from it, well, everyone who knew what it was and how it worked. We had the dotcom boom and bust, and it’s fair to say that if we ...

Read more...
Carrier rebranded Kidde Global Solutions
News & Events Fire & Safety
From July 2025, the former Carrier Fire & Security South Africa will operate under its new name, Kidde Fire & Security South Africa, as part of the global realignment of the commercial and residential fire and security business.

Read more...
Facilities Management Expo brings smart, secure operations to the Cape
Securex South Africa News & Events Facilities & Building Management
As organisations across South Africa navigate the challenges of ageing infrastructure and increased cyber-physical risks, integrated facilities management (FM) solutions have become critical to ensuring operational resilience.

Read more...
Specialised Exhibitions changes name to Montgomery Group Africa
News & Events
This name change reflects the consolidation of Montgomery Group’s regional divisions across Africa under one unified management structure, creating a more agile, efficient, and future-focused organisation.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.