Resources Filter by: All Posts White Papers Case Studies Blog December 19, 2024 Cybercriminals targeting the legal sector The Rise in Cyber Threats Against Law Firms: A Growing Concern Cybercrime targeting law firms has surged by 77%… Read more Blog December 17, 2024 Living Up to Its Name: Alleged Extortion Group LeakedData Begins to Leak Data Data leaks sites (DLSs) commonly debut with a small number of claimed victims. When Cyjax discovered them, newly… Read more Blog December 16, 2024 Stealer Malware and Stealer Logs Explained Stealer logs and the infostealers that harvest them form a key part of the threat landscape and cybercriminal… Read more Blog December 13, 2024 An Analysis of the Impact of Trump’s US Election Victory in the Middle East Introduction On 6 November 2024, former president and Republican candidate Donald Trump was re-elected to office in the… Read more Blog December 11, 2024 Phreak Out!: New Bluebox Extortion Group DLS Emerges Another week, another extortion group data-leak site emerges. Cyjax has continued to observe the emergence of data-leak sites (DLSs) for… Read more Blog December 11, 2024 Meta’s impact on fraud and scams Meta’s impact on fraud and scams Cyjax’s open-source intelligence team has recently conducted an investigation into Meta’s impact… Read more Blog December 3, 2024 Take Me Down to Funksec Town: Funksec Ransomware DLS Emergence Take Me Down to Funksec Town: Funksec Ransomware DLS Emergence Cyjax has continued to observe the emergence of… Read more Blog November 29, 2024 Threat Actor Recruitment: Exploiting Online Platforms to Target Employees CYJAX’s open-source intelligence team collects data from social media, instant messaging platforms, gated communities, and dark web locations… Read more Blog November 28, 2024 Don’t Get Golden Fleeced: New Argonauts Extortion Group Emerges Following the emergence of data-leak sites (DLSs) for new extortion groups Kairos, Chort, Termite, and CONTfr, Cyjax has… Read more White Paper November 25, 2024 Report | An Analysis of the Reactions to the Republican Election Victory Come up Trumps: An Analysis of the Reactions to the Republican Election Victory This report examines the aftermath… Read more Blog November 21, 2024 ContFRaversy in Ransomland: Tor-based site emerges for new French-speaking RaaS operation “ContFR” Following the emergence of data-leak sites (DLSs) for extortion groups Kairos, Chort, and Termite, Cyjax has observed the… Read more Blog November 19, 2024 The Devil and the Termite: data-leak sites emerge for Chort and Termite extortion groups Just days after Cyjax observed the emergence of a data-leak site (DLS) for new extortion group Kairos, DLSs… Read more Blog November 18, 2024 Kairos extortion group turns to initial access brokers Cyjax recently identified a new financially-motivated extortion group going by the name Kairos, which shares data stolen from… Read more Blog November 18, 2024 T(AI)WANted: How the global surge in AI likely caused an increase in Taiwan-targeted cybercrime Introduction Initial access brokers (IABs) facilitate access for ransomware groups, data brokers, and advanced persistent threat groups (APTs)… Read more Blog November 14, 2024 An elephant in Kairos: data-leak site emerges for new extortion group It is nearing 2025, and data-leak sites (DLSs) for extortion groups continue to emerge. November 2024 continues this… Read more Blog November 12, 2024 Don’t use DirtyWords: Fake Word documents phishing Microsoft credentials Overview CYJAX has identified a novel phishing technique which is used to harvest Microsoft credentials via websites which… Read more White Paper November 7, 2024 White Paper | Initial Access Broker Market Summary Q3 Q3 2024 Initial Access Broker Market Summary After analysing the IAB ecosystem in the first and second quarters… Read more Blog October 31, 2024 Weekly Cyber Threat Intelligence Summary Welcome to this week’s Cyber Threat Intelligence Summary, where we bring you the latest updates and insights on… Read more White Paper October 1, 2024 Initial Access Broker Market Q2 Summary Overview of the Initial Access Broker Market Q2 Initial Access Brokers (IABs) are a key part of the… Read more Case Study September 18, 2024 Uk Government Department The Challenges The client approached CYJAX to act as an OSINT (Open-Source Intelligence) team, with a focus on… Learn more Case Study September 18, 2024 Global Pharmaceutical Company The Challenges This client became a CYJAX customer in 2012, and needed assistance with surfacing and investigating security… Learn more Blog September 13, 2024 Weekly Cyber Threat Intelligence Summary Welcome to this week’s Cyber Threat Intelligence Summary, where we bring you the latest updates and insights on… Read more Blog September 2, 2024 The Hacktivist Response to UK Foreign Policy Introduction Hacktivism is by its very nature reactive, as it involves the use of computer-based techniques as a… Read more Blog August 30, 2024 Durov arrest and the CYJAX monitoring capability In today’s increasingly digital world, cybercrime and online criminal activities pose significant threats to individuals, businesses, and governments… Read more 1 2 3 … 11 Next »