Resources Filter by: All Posts White Papers Case Studies Blog February 21, 2025 How’s that for a malicious Linkc, new group launches DLS Introduction 2024 saw data-leak sites (DLSs) for 72 extortion groups materialise. As of February 2025, Cyjax has identified DLSs for… Read more Blog February 20, 2025 What is the MITRE ATT&CK Framework? The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework was developed in 2013 to document the tactics… Read more Blog February 19, 2025 A Guide to Working in Threat Intelligence What is Threat Intelligence? According to Gartner Research and McMillan (2003), “Threat intelligence is evidence-based knowledge, including context,… Read more Blog February 18, 2025 What are Advanced Persistent Threats (APTs)? Threat actors often use techniques such as phishing, lateral movement, and zero-days to gain and maintain access to… Read more Blog February 14, 2025 Top 15 Cybersecurity Events to Attend in London in 2025 As the global cybersecurity industry continues to grow, with the market projected to expand from USD 193.73 billion… Read more Blog February 12, 2025 Kraken onto the extortion scene: New Kraken DLS emerges Following the emergence of data-leak sites (DLSs) for Babuk Bjorka, GD LockerSec, and Morpheus in January 2025, a… Read more Blog February 12, 2025 The Need for Contextualised Threat Intelligence Introduction In today’s digital landscape, cyber threats are evolving at an unprecedented pace, growing more sophisticated and harder… Read more White Paper February 6, 2025 White Paper | Initial Access Broker Market 2024 In Review Initial Access Broker Market 2024 In Review Initial access brokers (IABs) have operated a specialised and lucrative market… Read more Blog January 30, 2025 New year’s reconnaissance resolutions! Cyjax operates within the dark web and ‘hidden service’ spaces to ensure a rich and current intelligence picture… Read more Blog January 29, 2025 Babuk Ba-back? Potential Return of the Infamous RaaS Group Introduction Following the emergence of data-leak sites (DLSs) for extortion groups Morpheus and GD LockerSec in January 2025, Cyjax has discovered a DLS… Read more Blog January 29, 2025 2024 Year in Review: ransomware groups, hacktivists, and IABs targeting the Middle East Key takeaways Introduction This report will provide an overview of the various extortion groups, hacktivists, and initial access… Read more Blog January 28, 2025 The Ultimate Guide To Ransomware: Understanding, Identifying and Preventing Attacks Ransomware is one of the most prominent cybersecurity threats today, often spreading via phishing emails, malicious links, infected… Read more Blog January 27, 2025 Importance of Speed in Threat Intelligence Introduction The threat landscape is evolving at an unprecedented rate, with organisations facing increasingly complex and malicious cyber… Read more Blog January 27, 2025 A New Amazonian? Data-Leak Site Emerges for New Extortion Group GD LockerSec Following the emergence of data-leak sites (DLSs) for extortion group Morpheus earlier this year, Cyjax has discovered a… Read more Blog January 23, 2025 Top 10 Threat Intelligence Jobs in the UK Why Pursue a Career in Threat Intelligence? The global threat intelligence market size was valued at USD 5.80… Read more White Paper January 22, 2025 White Paper | Initial Access Broker Market Summary Q4 Q4 2024 Initial Access Broker Market Summary After analysing the IAB ecosystem in Q1, Q2, and Q3 2024,… Read more Blog January 17, 2025 Time Out for TikTok: An exploration of the risks presented by the US TikTok ban Introduction On 13 March 2024, the US House of Representatives approved a bill which demands that the China-based… Read more Blog January 17, 2025 ConVErsations: Criminal Discussion of Vulnerabilities and Exploits Defenders often discuss security vulnerabilities on GitHub, Stack overflow, X (formerly Twitter), and other platforms to share knowledge… Read more Case Study January 13, 2025 Case Study | Enhancing Cybersecurity Resilience for a Leading Utility Provider Enhancing Cybersecurity Resilience This case study explores how a leading utility provider worked with CYJAX to enhance its… Learn more Blog January 8, 2025 The Great Morpheus: New Extortion Group DLS Emerges Introduction As 2025 progresses into its second week, it has not taken long for a new data-leak site… Read more Blog December 19, 2024 Cybercriminals targeting the legal sector The Rise in Cyber Threats Against Law Firms: A Growing Concern Cybercrime targeting law firms has surged by 77%… Read more Blog December 17, 2024 Living Up to Its Name: Alleged Extortion Group LeakedData Begins to Leak Data Data leaks sites (DLSs) commonly debut with a small number of claimed victims. When Cyjax discovered them, newly… Read more Blog December 16, 2024 Stealer Malware and Stealer Logs Explained Stealer logs and the infostealers that harvest them form a key part of the threat landscape and cybercriminal… Read more Blog December 13, 2024 An Analysis of the Impact of Trump’s US Election Victory in the Middle East Introduction On 6 November 2024, former president and Republican candidate Donald Trump was re-elected to office in the… Read more 1 2 3 … 12 Next »