Resources

Cybercriminals targeting the legal sector  Blog

Cybercriminals targeting the legal sector 

The Rise in Cyber Threats Against Law Firms: A Growing Concern Cybercrime targeting law firms has surged by 77%…

Read more
Living Up to Its Name: Alleged Extortion Group LeakedData Begins to Leak Data Blog

Living Up to Its Name: Alleged Extortion Group LeakedData Begins to Leak Data

Data leaks sites (DLSs) commonly debut with a small number of claimed victims. When Cyjax discovered them, newly…

Read more
Stealer Malware and Stealer Logs Explained Blog

Stealer Malware and Stealer Logs Explained

Stealer logs and the infostealers that harvest them form a key part of the threat landscape and cybercriminal…

Read more
An Analysis of the Impact of Trump’s US Election Victory in the Middle East Blog

An Analysis of the Impact of Trump’s US Election Victory in the Middle East

Introduction  On 6 November 2024, former president and Republican candidate Donald Trump was re-elected to office in the…

Read more
Phreak Out!: New Bluebox Extortion Group DLS Emerges Blog

Phreak Out!: New Bluebox Extortion Group DLS Emerges

Another week, another extortion group data-leak site emerges. Cyjax has continued to observe the emergence of data-leak sites (DLSs) for…

Read more
Meta’s impact on fraud and scams Blog

Meta’s impact on fraud and scams

Meta’s impact on fraud and scams Cyjax’s open-source intelligence team has recently conducted an investigation into Meta’s impact…

Read more
Take Me Down to Funksec Town: Funksec Ransomware DLS Emergence  Blog

Take Me Down to Funksec Town: Funksec Ransomware DLS Emergence 

Take Me Down to Funksec Town: Funksec Ransomware DLS Emergence Cyjax has continued to observe the emergence of…

Read more
Threat Actor Recruitment: Exploiting Online Platforms to Target Employees Blog

Threat Actor Recruitment: Exploiting Online Platforms to Target Employees

CYJAX’s open-source intelligence team collects data from social media, instant messaging platforms, gated communities, and dark web locations…

Read more
Don’t Get Golden Fleeced: New Argonauts Extortion Group Emerges Blog

Don’t Get Golden Fleeced: New Argonauts Extortion Group Emerges

Following the emergence of data-leak sites (DLSs) for new extortion groups Kairos, Chort, Termite, and CONTfr, Cyjax has…

Read more
Report | An Analysis of the Reactions to the Republican Election Victory White Paper

Report | An Analysis of the Reactions to the Republican Election Victory

Come up Trumps: An Analysis of the Reactions to the Republican Election Victory This report examines the aftermath…

Read more
ContFRaversy in Ransomland: Tor-based site emerges for new French-speaking RaaS operation “ContFR”  Blog

ContFRaversy in Ransomland: Tor-based site emerges for new French-speaking RaaS operation “ContFR” 

Following the emergence of data-leak sites (DLSs) for extortion groups Kairos, Chort, and Termite, Cyjax has observed the…

Read more
The Devil and the Termite: data-leak sites emerge for Chort and Termite extortion groups Blog

The Devil and the Termite: data-leak sites emerge for Chort and Termite extortion groups

Just days after Cyjax observed the emergence of a data-leak site (DLS) for new extortion group Kairos, DLSs…

Read more
Kairos extortion group turns to initial access brokers  Blog

Kairos extortion group turns to initial access brokers 

Cyjax recently identified a new financially-motivated extortion group going by the name Kairos, which shares data stolen from…

Read more
T(AI)WANted: How the global surge in AI likely caused an increase in Taiwan-targeted cybercrime  Blog

T(AI)WANted: How the global surge in AI likely caused an increase in Taiwan-targeted cybercrime 

Introduction  Initial access brokers (IABs) facilitate access for ransomware groups, data brokers, and advanced persistent threat groups (APTs)…

Read more
An elephant in Kairos: data-leak site emerges for new extortion group Blog

An elephant in Kairos: data-leak site emerges for new extortion group

It is nearing 2025, and data-leak sites (DLSs) for extortion groups continue to emerge. November 2024 continues this…

Read more
Don’t use DirtyWords: Fake Word documents phishing Microsoft credentials  Blog

Don’t use DirtyWords: Fake Word documents phishing Microsoft credentials 

Overview  CYJAX has identified a novel phishing technique which is used to harvest Microsoft credentials via websites which…

Read more
White Paper | Initial Access Broker Market Summary Q3 White Paper

White Paper | Initial Access Broker Market Summary Q3

Q3 2024 Initial Access Broker Market Summary After analysing the IAB ecosystem in the first and second quarters…

Read more
Weekly Cyber Threat Intelligence Summary Blog

Weekly Cyber Threat Intelligence Summary

Welcome to this week’s Cyber Threat Intelligence Summary, where we bring you the latest updates and insights on…

Read more
Initial Access Broker Market Q2 Summary White Paper

Initial Access Broker Market Q2 Summary

Overview of the Initial Access Broker Market Q2 Initial Access Brokers (IABs) are a key part of the…

Read more
Uk Government Department Case Study

Uk Government Department

The Challenges The client approached CYJAX to act as an OSINT (Open-Source Intelligence) team, with a focus on…

Learn more
Global Pharmaceutical Company Case Study

Global Pharmaceutical Company

The Challenges This client became a CYJAX customer in 2012, and needed assistance with surfacing and investigating security…

Learn more
Weekly Cyber Threat Intelligence Summary Blog

Weekly Cyber Threat Intelligence Summary

Welcome to this week’s Cyber Threat Intelligence Summary, where we bring you the latest updates and insights on…

Read more
The Hacktivist Response to UK Foreign Policy Blog

The Hacktivist Response to UK Foreign Policy

Introduction Hacktivism is by its very nature reactive, as it involves the use of computer-based techniques as a…

Read more
Durov arrest and the CYJAX monitoring capability Blog

Durov arrest and the CYJAX monitoring capability

In today’s increasingly digital world, cybercrime and online criminal activities pose significant threats to individuals, businesses, and governments…

Read more
1 2 3 11
Scroll to Top