Resources

Who broke the Internet? Arkana Security names U.S. broadband provider on new DLS Blog

Who broke the Internet? Arkana Security names U.S. broadband provider on new DLS

Introduction In 2024, Cyjax observed the emergence of 72 extortion and ransomware group data-leak sites (DLSs). As of…

Read more
Top 10 Threat Intelligence Jobs in the UK Blog

Top 10 Threat Intelligence Jobs in the UK

Why Pursue a Career in Threat Intelligence? The global threat intelligence market size was valued at USD 5.80…

Read more
Ultimate Guide: Leveraging Intelligence to Prevent Card Fraud White Paper

Ultimate Guide: Leveraging Intelligence to Prevent Card Fraud

Ultimate Guide: Leveraging Intelligence to Prevent Card Fraud Card fraud is evolving—fast. With unauthorised payment card fraud surpassing £275…

Read more
Beyond the Threats: The People of Cyjax Blog

Beyond the Threats: The People of Cyjax

Beyond the Threats: The People of Cyjax At Cyjax, our strength lies in the people who drive our…

Read more
Maximising the Value of Threat Intelligence White Paper

Maximising the Value of Threat Intelligence

Maximising the Value of Threat Intelligence To stay ahead of evolving cyber threats, it’s not just data that…

Read more
The ROI of threat intelligence: Measuring the Value Beyond Detection Blog

The ROI of threat intelligence: Measuring the Value Beyond Detection

Cybersecurity investment is a critical balancing act between cost and protection. Threat intelligence is often seen as a…

Read more
The Future of Threat Intelligence: Trends, Tools, and Tactics To Watch Blog

The Future of Threat Intelligence: Trends, Tools, and Tactics To Watch

In today’s evolving cyber landscape, threat intelligence has become a cornerstone of effective cybersecurity strategies. As cyber threats…

Read more
Core access: an analysis of the UK government’s demand to Apple  Blog

Core access: an analysis of the UK government’s demand to Apple 

What is the demand? On 7 February 2025, it was reported that the UK government had demanded that…

Read more
The BlackBasta Ransomware Leaks: What You Need to Know Blog

The BlackBasta Ransomware Leaks: What You Need to Know

Introduction  On 11 February 2025, a Telegram user called ExploitWhispers shared a ZIP file to a Russian-language Telegram…

Read more
From Initial Access to Ransomware Attack: An Analysis of Timelines from IAB Listings on Cybercriminal Forums to Extortion Attacks  Blog

From Initial Access to Ransomware Attack: An Analysis of Timelines from IAB Listings on Cybercriminal Forums to Extortion Attacks 

Introduction Cyjax monitors and analyses the initial access broker (IAB) market on the most prominent cybercriminal forums. As noted in…

Read more
How to Solve the Problem of Alert Fatigue Blog

How to Solve the Problem of Alert Fatigue

Security Operations Centre (SOC) analysts are at the forefront of cybersecurity defence, managing thousands of alerts every day….

Read more
Using Threat Intelligence to Support Regulatory Compliance  Blog

Using Threat Intelligence to Support Regulatory Compliance 

As cyber threats evolve in scale and sophistication, governments and regulatory bodies are tightening cybersecurity and data protection…

Read more
Is that Ra? Nope, it is RaaS – DLS emerges for New Extortion Group Anubis Blog

Is that Ra? Nope, it is RaaS – DLS emerges for New Extortion Group Anubis

Introduction In 2024, Cyjax observed the emergence of 72 extortion and ransomware group data-leak sites (DLSs). As of…

Read more
The Use Of Artificial Intelligence In Threat Intelligence Blog

The Use Of Artificial Intelligence In Threat Intelligence

Artificial Intelligence (AI) is a double-edged sword in cybersecurity, empowering both defenders and attackers. AI-driven security systems are…

Read more
Beyond the Threats: The People of Cyjax Blog

Beyond the Threats: The People of Cyjax

Beyond the Threats: The People of Cyjax At Cyjax, our strength lies in the people who drive our…

Read more
How’s that for a malicious Linkc, new group launches DLS Blog

How’s that for a malicious Linkc, new group launches DLS

Introduction  2024 saw data-leak sites (DLSs) for 72 extortion groups materialise. As of February 2025, Cyjax has identified DLSs for…

Read more
What is the MITRE ATT&CK Framework? Blog

What is the MITRE ATT&CK Framework?

The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework was developed in 2013 to document the tactics…

Read more
A Guide to Working in Threat Intelligence Blog

A Guide to Working in Threat Intelligence

What is Threat Intelligence?  According to Gartner Research and McMillan (2003), “Threat intelligence is evidence-based knowledge, including context,…

Read more
What are Advanced Persistent Threats (APTs)? Blog

What are Advanced Persistent Threats (APTs)?

Threat actors often use techniques such as phishing, lateral movement, and zero-days to gain and maintain access to…

Read more
Top 15 Cybersecurity Events to Attend in London in 2025  Blog

Top 15 Cybersecurity Events to Attend in London in 2025 

As the global cybersecurity industry continues to grow, with the market projected to expand from USD 193.73 billion…

Read more
Kraken onto the extortion scene: New Kraken DLS emerges Blog

Kraken onto the extortion scene: New Kraken DLS emerges

Following the emergence of data-leak sites (DLSs) for Babuk Bjorka, GD LockerSec, and Morpheus in January 2025, a…

Read more
The Need for Contextualised Threat Intelligence  Blog

The Need for Contextualised Threat Intelligence 

Introduction  In today’s digital landscape, cyber threats are evolving at an unprecedented pace, growing more sophisticated and harder…

Read more
White Paper | Initial Access Broker Market 2024 In Review White Paper

White Paper | Initial Access Broker Market 2024 In Review

Initial Access Broker Market 2024 In Review Initial access brokers (IABs) have operated a specialised and lucrative market…

Read more
New year’s reconnaissance resolutions!  Blog

New year’s reconnaissance resolutions! 

Cyjax operates within the dark web and ‘hidden service’ spaces to ensure a rich and current intelligence picture…

Read more
1 2 3 13
Scroll to Top