Resources Filter by: All Posts White Papers Case Studies Blog November 21, 2024 ContFRaversy in Ransomland: Tor-based site emerges for new French-speaking RaaS operation “ContFR” Following the emergence of data-leak sites (DLSs) for extortion groups Kairos, Chort, and Termite, Cyjax has observed the… Read more Blog November 19, 2024 The Devil and the Termite: data-leak sites emerge for Chort and Termite extortion groups Just days after Cyjax observed the emergence of a data-leak site (DLS) for new extortion group Kairos, DLSs… Read more Blog November 18, 2024 Kairos extortion group turns to initial access brokers Cyjax recently identified a new financially-motivated extortion group going by the name Kairos, which shares data stolen from… Read more Blog November 18, 2024 T(AI)WANted: How the global surge in AI likely caused an increase in Taiwan-targeted cybercrime Introduction Initial access brokers (IABs) facilitate access for ransomware groups, data brokers, and advanced persistent threat groups (APTs)… Read more Blog November 14, 2024 An elephant in Kairos: data-leak site emerges for new extortion group It is nearing 2025, and data-leak sites (DLSs) for extortion groups continue to emerge. November 2024 continues this… Read more Blog November 12, 2024 Don’t use DirtyWords: Fake Word documents phishing Microsoft credentials Overview CYJAX has identified a novel phishing technique which is used to harvest Microsoft credentials via websites which… Read more White Paper November 7, 2024 White Paper | Initial Access Broker Market Summary Q3 Q3 2024 Initial Access Broker Market Summary After analysing the IAB ecosystem in the first and second quarters… Read more Blog October 31, 2024 Weekly Cyber Threat Intelligence Summary Welcome to this week’s Cyber Threat Intelligence Summary, where we bring you the latest updates and insights on… Read more Blog October 1, 2024 Initial Access Broker Market Q2 Summary Overview of the Initial Access Broker Market Q2 Initial Access Brokers (IABs) are a key part of the… Read more Case Study September 18, 2024 Uk Government Department The Challenges The client approached CYJAX to act as an OSINT (Open-Source Intelligence) team, with a focus on… Learn more Case Study September 18, 2024 Global Pharmaceutical Company The Challenges This client became a CYJAX customer in 2012, and needed assistance with surfacing and investigating security… Learn more Blog September 13, 2024 Weekly Cyber Threat Intelligence Summary Welcome to this week’s Cyber Threat Intelligence Summary, where we bring you the latest updates and insights on… Read more Blog September 2, 2024 The Hacktivist Response to UK Foreign Policy Introduction Hacktivism is by its very nature reactive, as it involves the use of computer-based techniques as a… Read more Blog August 30, 2024 Durov arrest and the CYJAX monitoring capability In today’s increasingly digital world, cybercrime and online criminal activities pose significant threats to individuals, businesses, and governments… Read more Blog August 27, 2024 The wider impact of the CrowdStrike outage Introduction On Friday 19 July 2024, CrowdStrike suffered a serious outage in which over 8.5 million computers were taken… Read more Blog August 19, 2024 Data-leak site emergence continues to increase Introduction As the threat landscape continues to develop, ransomware and data brokerage groups constantly emerge, develop, and disband…. Read more Blog July 25, 2024 CVE discovery, PoC Development, IAB Listings, to Ransomware Attacks: How Cybercriminal Forums Facilitate the Lifecycle By Olivia Betts and Adam Price In July 2024, CloudFlare identified that it can take cybercriminals as little as 22… Read more Blog July 8, 2024 UK Election – The Hacktivism Perspective By Jake Keast Introduction The UK General Election marks a monumental time in UK politics. There has been… Read more White Paper June 25, 2024 Cloud Threat Landscape Report: Synopsis CYJAX has published a new White Paper which explores the current threat landscape affecting the cloud, including notable… Read more White Paper June 25, 2024 Cyber Supply Chain Attacks: Examples and how they happen Unlock the Secrets of Cyber Supply Chain Attacks In today’s digital landscape, businesses and organisations face an ever-increasing… Read more White Paper June 25, 2024 Initial Access Broker Market Summary Q1 2024 Initial Access Broker Market Summary In 2024, the trade of initial access to corporate networks remains… Read more Blog June 21, 2024 The Cybersecurity and Geopolitical Discussion — Vote UK — Episode 23 Geopolitical, cyber and security implications of the upcoming British election To find out, check out Episode 23 of… Read more Blog May 30, 2024 Here, There, Ransomware: The Surge of New Ransomware Groups Introduction From late 2023 and into 2024, the ransomware ecosystem has become more diverse than ever, with an… Read more Blog May 16, 2024 Cyber Threat Intelligence Update: Data Breach, Ransomware Trends, and Emerging AI Threats This blog provides a comprehensive update on a major data breach at the UK Ministry of Defence, a… Read more 1 2 3 … 11 Next »