Sitemap
-
Products and services
-
Services -
Products
-
- Industries
-
Expertise
- Materials
-
Technical articles - Venture Wolf attempts to disrupt Russian businesses with MetaStealer
- Exploring CVE-2024-38227 vulnerability in Microsoft SharePoint
- Core Werewolf hones its arsenal against Russia's government organizations
- Wreaking havoc in cyberspace: threat actors experiment with pentest tools
- Zooming in on CVE-2024-7965
- Stone Wolf employs Meduza Stealer to hack Russian companies
- Breaking down Windows critical vulnerability CVE-2024-38063
- Bloody Wolf strikes organizations in Kazakhstan with STRRAT commercial malware
- Sapphire Werewolf polishes Amethyst stealer to attack over 300 companies
- Scaly Wolf's new loader: the right tool for the wrong job
- Cloud Werewolf spearphishes for government employees in Russia and Belarus with fake spa vouchers and federal decrees
- Fluffy Wolf sends out reconciliation reports to sneak into corporate infrastructures
- Mysterious Werewolf hits defense industry with new RingSpy backdoor
- Scaly Wolf uses White Snake stealer against Russian industry
- A striking resemblance: Gambling Hyena and Twelfth Hyena clusters compared
- Rare Wolf preys on sensitive data using fake 1C:Enterprise invoices as a lure
- Mysterious Werewolf attacks Russian industry
- A research of attacks on public organizations involving Malware-as-a-Service tools
- White Snake is weaponized against Russian companies
- New hacker group Quartz Wolf leverages legitimate software to attack the hospitality/hotel industry
- Red Wolf is back to spy on commercial firms
- Core Werewolf targets the defense industry and critical infrastructure
- Malware: everybody gets one. How open-source software steals corporate passwords
- Watch Wolf targets accountants through SEO poisoning
- Destructive attacks by Key Wolf: how to spot the new ransomware
- Vulnerabilities in J-Link licensing system
- Our New Log4j Scanner to Combat Log4Shell
- Insecure deserialization
- Security of JSON Web Tokens (JWT)
- Threat Hunting in action
- Threat Hunting. Why might you need it
- Hunting down MS Exchange attacks. Part 1. ProxyLogon (CVE-2021-26855, 26858, 27065, 26857)
- Hunting for advanced Tactics, Techniques and Procedures (TTPs)
- Hunting down MS Exchange attacks. Part 2 (CVE-2020-0688, CVE-2020-16875, CVE-2021-24085)
-
Events -
Business continuity management - Business impact analysis. Preparing your company for adverse events
- Monitoring. Improving resilience to cyberattacks through rapid incident response
- Awareness. Mitigating human error in corporate cybersecurity
- The path to digital leadership. The fundamentals of business continuity management
- Public relations. Neutralizing potential reputational impact from cyber incidents
- Cyber insurance. Getting the most out of it
- Cyber risk management. Identifying the main threats to your company
- The path to digital leadership. Practical guide on incident management
- Threat Zone
-
About us
- About us
-
News - Cyber Polygon 2024 highlights
- RATs and stealers are most favored by adversaries attacking Russian business
- Core Werewolf bolsters attacks against Russia’s defense industry and critical infrastructure
- Hackers favor uncommon pentest tools over malware
- CVE-2024-7965 Google Chrome vulnerability affects Android smartphones and macOS laptops
- More than 300 organizations from 65 countries participated in Cyber Polygon 2024
- Key trends in GCC cyber threat landscape to be presented at MENA ISC 2024
- Hackers increasingly ignore restrictions of commercial malware developers
- BI.ZONE to contribute to MENA ISC
- OFFZONE 2024 attracts record attendance
- BI.ZONE EDR expands capabilities to better assess endpoint configuration
- Undercover attack: nearly 85% of phishing emails are disguised as financial and government documents
- BI.ZONE Threat Intelligence offers a new analytical tool
- Participants from over 20 countries now listed for Cyber Polygon 2024 training
- Sapphire Werewolf polishes open‑source stealer to spy on Russian organizations
- Registration for Cyber Polygon 2024 now open
- BI.ZONE WAF counters new vulnerability in Confluence
- Presenting on-prem BI.ZONE EDR endpoint security solution
- Haste makes waste: Scaly Wolf’s attacks fail over a major blunder
- BI.ZONE WAF responds to multiple Formidator WordPress plug‑in vulnerabilities
- New BI.ZONE CESP protects against quishing, takes into account employee cyber awareness levels
- BI.ZONE CPT updated to better handle threats to web applications
- Fluffy Wolf causes much damage with unsophisticated attacks
- Mysterious Werewolf develops a backdoor to strike Russian defense industry targets
- BI.ZONE WAF addresses two critical vulnerabilities in JetBrains TeamCity software
- We launched BI.ZONE Cyber Polygon Platform for individual training
- Scaly Wolf takes aim at Russia’s manufacturing and logistics enterprises
- Dates fixed for OFFZONE 2024
- BI.ZONE WAF handles five vulnerabilities in GitLab
- ICRC releases a report on digital threats during armed conflict
- BI.ZONE is first in Russia to become attested to latest ISO/IEC 27001:2022
- Rare Wolf disguises malicious attachments as 1C:Enterprise invoices
- Introducing our newest research “The seven faces of darkness”
- BI.ZONE WAF guards against new WordPress vulnerability
- BI.ZONE WAF counters critical vulnerability in Confluence
- Sticky Werewolf attacks public organizations in Russia and Belarus
- Presenting an updated BI.ZONE AntiFraud solution
- Deception module and macOS support: BI.ZONE EDR functionality expanded
- BI.ZONE: threat actors use leaked source code to attack Russian companies
- Fourth OFFZONE conference on practical cybersecurity held in Moscow
- Teams from 117 countries demonstrated ethical hacking skills in CTFZone 2023
- BI.ZONE discovers new phishing campaign distributing White Snake stealer to Russian companies
- BI.ZONE CESP enables customized protection of corporate email
- BI.ZONE Secure SD-WAN update delivers network scalability and security improvements
- Cybercriminals debut Russian remote access software for targeted attacks
- Red Wolf is back to spy against commercial firms
- Surge recorded in websites offering quick earnings on Tesla
- BI.ZONE contributes to the International Committee of the Red Cross on the digitalization of humanitarian emblems
- BI.ZONE uncovers espionage attacks on the defense industry and critical infrastructure
- BI.ZONE: cybercriminals steal corporate passwords using open‑source software
- BI.ZONE sheds light on data breaches caused by Leak Wolf’s malware-free attacks
- BI.ZONE releases in-depth guidelines on business impact analysis
- BI.ZONE presents an updated version of its antifraud system
- BI.ZONE unearths SEO poisoning attacks targeting accountants
- BI.ZONE CESP swiftly responds to protect Outlook users against CVE-2023-23397
- BI.ZONE detects destructive ransomware attacks against Russian users
- BI.ZONE specialists are now certified to latest ISO/IEC 27001:2022
- BI.ZONE launches Cyber Polygon platform for individual trainings
- Save the date: OFFZONE 2023 is coming in August
- New BI.ZONE service helps to detect signs of intrusions
- BI.ZONE CESP reinforced to improve email protection
- BI.ZONE Brand Protection revamped to better protect business from cyber threats
- The number of fraudulent websites in Q1 2022 triples compared to 2021
- Cyber Polygon postponed
- Cyber Polygon 2022 to take place on July 8
- BI.ZONE recertifies for ISO/IEC 27001 and ISO 9001
- Sber’s subsidiary BI.ZONE publishes a tool to combat a new critical vulnerability
- BI.ZONE combines MSSP SOC and MDR in a single service
- Cyber Polygon 2021: ISS, Steve Wozniak, INTERPOL, UNICEF and many others
- UNICEF Executive Director Henrietta Fore to speak on online child safety
- Cyber Polygon 2021 to address global response to ransomware
- Herman Gref and Steve Wozniak will meet at Cyber Polygon 2021 to discuss secure ecosystem development
- Bank of Russia, Mastercard and Visa to discuss the development of digital currencies at Cyber Polygon 2021
- Red Cross advocates for the safe cyber space
- Teams from 61 countries took part in the CTFZone 2021 ethical hacking competition
- Global corporations to discuss supply chain security at Cyber Polygon 2021
- BI.ZONE now part of the Global Advisory Board on digital threats
- BI.ZONE and MEEZA to develop cybersecurity outsourcing in Qatar
- Cyber Polygon to focus on secure development of digital ecosystems
- Financial institutions and IT companies best prepared for cyber threats
- BI.ZONE Security Operations Center awarded PCI DSS certification
- BI.ZONE summarizes results of the stay home initiative
- Cyber Polygon 2020 international online exercise ends in success
- Klaus Schwab to speak at Cyber Polygon 2020
- Fake news gaining momentum. Vladimir Pozner and Nik Gowing to discuss the problem of disinformation on the Internet at Cyber Polygon 2020
- International organizations preparing to repel cyber threats
- Sberbank and BI.ZONE publish research “Threat Zone 2020: Not waiting for thunder”
- Cyber Polygon 2020: global experts to discuss how to prevent a digital pandemic
- BI.ZONE supports the healthcare effort against COVID-19
- BI.ZONE and NGENIX become partners
- INTERPOL to join Cyber Polygon 2020
- BI.ZONE awarded global CREST accreditation
- BI.ZONE uncovers a new fraud scheme on classifieds websites
- BI.ZONE Fraud Prevention receives federal acclaim
- Russia wins the international ethical hacking competition CTFZone 2020
- Teams from 7 countries to battle out in the CTFZone final
- BI.ZONE announces the launch of its new cybersecurity services platform Def.Zone
- COVID-19 has awakened Faketoken
- BI.ZONE services receive international acclaim
- BI.ZONE gives free access to its cybersecurity services
- More than 60% of cyber incidents in aviation are linked to human error
- BI.ZONE at the Cyber Polygon session in Davos: more than 80% of companies worldwide are not ready for cyber crisis
- BI.ZONE’s projects spark interest in Japan
- BI.ZONE will prepare IT infrastructure to repel cyberattacks
- BI.ZONE and Qrator Labs have presented a joint anti-DDoS solution
- BI.ZONE presents a report on the Cyber Polygon international exercise at the World Economic Forum’s event
- BI.ZONE will support INTERPOL’s anti-phishing campaign
- BI.ZONE offers a new approach to protecting external IT perimeters
- Russian company BI.ZONE contributes its expertise in cybersecurity at Seamless Philippines 2019
- BI.ZONE and MegaFon join efforts to counter banking fraud
- Threat Intelligence platform—first year results summary
- BI.ZONE to scan banking infrastructures for compliance with PCI DSS cybersecurity requirement
- BI.ZONE to offer outsourced cybersecurity
- 5G, artificial intelligence and biometrics will determine the cybersecurity strategy for the next decade
- BI.ZONE starts combatting cybercrime in Qatar
- BI.ZONE and Transtelecom JSC to create an integrated cybersecurity platform in Kazakhstan
- Astana International Financial Centre and BI.ZONE sign a Memorandum of Understanding
- BI.ZONE and SITRONICS to carry out cybersecurity projects
- Moscow hosts the second international conference on cybersecurity OFFZONE 2019
- BI.ZONE to present its products and services at the ICC—International Cybersecurity Congress
- BI.ZONE and Bank Saint Petersburg enter into an agreement of cooperation
- BI.ZONE makes a projection of the future of cybersecurity at the World Economic Forum in Davos
- BI.ZONE establishes a research center in Tomsk
- The Association of Banks of Russia and BI.ZONE review the pilot run of Threat Intelligence Platform
- BI.ZONE held the international conference OFFZONE 2018
- BI.ZONE participated in Sibos 2018
- BI.ZONE holds OFFZONE 2018 in November
- BI.ZONE signed agreements with new partners at ICC 2018
- Threat Zone 17/18: new challenges of the digital world
- BI.ZONE participated in the International Cybersecurity Congress
- Association of Banks of Russia and BI.ZONE held a technical workshop on TI.Platform
- Association of Banks of Russia and BI.ZONE launch Threat Intelligence platform
- BI.ZONE introduced its products and services at RSA Conference 2018
- BI.ZONE-CERT now authorized by Carnegie Mellon University
- BI.ZONE and the Association of Banks of Russia launch Threat Intelligence Exchange Platform
- BI.ZONE and Smart City School gave a lecture on cybersecurity
- CTFZone 2017: review
- BI.ZONE wins “Russian Internet Security” award
- Palo Alto Networks named BI.ZONE partner of the year in Threat Intelligence
- Bad Rabbit ransomware
- BI.ZONE introduced products and services at Sibos 2017
- INTERPOL and BI.ZONE strengthen cooperation in combating global cybercrime
- SWIFT recommends BI.ZONE as a cybersecurity provider
- First round of CTFZone contest by BI.ZONE successfully completed
- BI.ZONE at RANEPA Summer Campus
- PETYA malware
- CTFzone Presidential election
- Vulnerability scanner SambaCry
- Vulnerability scanner MS17-010
- BI.ZONE becomes RAEC member
- BI.ZONE becomes FIRST member
- CTFzone 2016: review and results
- CTF announcement Easter Egg write-up
- BI.ZONE invites everyone to take part in CTFzone
- BI.ZONE is a new partner of ZERONIGHTS 2016
- BI.ZONE is now a Netoscope member
- BI.ZONE is ready to protect Sberbank
- Contact us
- Privacy Policy
- Cybersecurity vulnerability disclosure policy
- Legal information