Resources

Moving Beyond IT: The Strategic Value of Threat Intelligence for Businesses  Blog

Moving Beyond IT: The Strategic Value of Threat Intelligence for Businesses 

In today’s digital-first world, cyber threats are not only increasing in volume, but they’re also becoming more targeted,…

Read more
Cyber Threat Intelligence for Law Enforcement Case Study

Cyber Threat Intelligence for Law Enforcement

Cybercrime is growing fast, blending old crimes with new tactics in a borderless, digital world. With low risk…

Learn more
Shifting to Prevention: How Intelligence Can Stop Card Fraud in Its Tracks  Blog

Shifting to Prevention: How Intelligence Can Stop Card Fraud in Its Tracks 

Fraudsters are relentless in their pursuit, targeting physical cards, intercepting personal data, and exploiting online vulnerabilities, all with…

Read more
CYJAX announces strategic partnership with Cyro Cyber to strengthen cyber threat intelligence capabilities Blog

CYJAX announces strategic partnership with Cyro Cyber to strengthen cyber threat intelligence capabilities

London, Monday 31st March CYJAX, a leader in advanced threat intelligence, and Cyro Cyber, a trusted managed security…

Read more
Cyber Threat Intelligence to Counter Activist Campaigners Blog

Cyber Threat Intelligence to Counter Activist Campaigners

A new activist group is targeting insurance companies. Boycott Bloody Insurance (BBI) aims to raise awareness of the…

Read more
Initial Access Brokers Explained Blog

Initial Access Brokers Explained

Introduction Initial access brokers (IABs) form a key part of the cybercriminal ecosystem. They facilitate access for ransomware…

Read more
A DLS EMERGEncy! –  Record breaking extortion group DLS emergence in 2025 Blog

A DLS EMERGEncy! –  Record breaking extortion group DLS emergence in 2025

Introduction As the threat landscape continues to develop, ransomware and data broker groups constantly emerge, develop, and disband….

Read more
Top 33 Leaders in Threat Intelligence 2025 Blog

Top 33 Leaders in Threat Intelligence 2025

Leadership is the backbone of any successful operation, streamlining complex processes and ensuring that teams work with clarity…

Read more
Decoding Threat Intelligence: A Glossary Blog

Decoding Threat Intelligence: A Glossary

The Language of Threat Intelligence Threat intelligence is a vast and evolving field that encompasses a wide range…

Read more
Build vs. Buy: What’s the Best Threat Intelligence Approach?  Blog

Build vs. Buy: What’s the Best Threat Intelligence Approach? 

Cyber threats are escalating rapidly, with the cost of global cybercrime projected to reach $10.5 trillion annually by…

Read more
ARaaStocracy – RALord ransomware emerges with new DLS Blog

ARaaStocracy – RALord ransomware emerges with new DLS

Introduction The latest data leaks site (DLS) Cyjax has identified is titled RALord, which constitutes one of 14…

Read more
RU against the Machine: The failures of machine translation for analysing Russian-language forums Blog

RU against the Machine: The failures of machine translation for analysing Russian-language forums

Introduction Russian slang such as ‘fenya’ and ‘mat’ and cybercriminal-specific dialect is used throughout hidden services, especially on forums….

Read more
Frag explodes onto the scene – New DLS emerges for Frag ransomware Blog

Frag explodes onto the scene – New DLS emerges for Frag ransomware

Introduction In 2024, Cyjax observed the emergence of 72 extortion and ransomware group data-leak sites (DLSs). As of…

Read more
Who broke the Internet? Arkana Security names U.S. broadband provider on new DLS Blog

Who broke the Internet? Arkana Security names U.S. broadband provider on new DLS

Introduction In 2024, Cyjax observed the emergence of 72 extortion and ransomware group data-leak sites (DLSs). As of…

Read more
Top 10 Threat Intelligence Jobs in the UK Blog

Top 10 Threat Intelligence Jobs in the UK

Why Pursue a Career in Threat Intelligence? The global threat intelligence market size was valued at USD 5.80…

Read more
Ultimate Guide: Leveraging Intelligence to Prevent Card Fraud White Paper

Ultimate Guide: Leveraging Intelligence to Prevent Card Fraud

Ultimate Guide: Leveraging Intelligence to Prevent Card Fraud Card fraud is evolving—fast. With unauthorised payment card fraud surpassing £275…

Read more
Beyond the Threats: The People of Cyjax Blog

Beyond the Threats: The People of Cyjax

Beyond the Threats: The People of Cyjax At Cyjax, our strength lies in the people who drive our…

Read more
Maximising the Value of Threat Intelligence White Paper

Maximising the Value of Threat Intelligence

Maximising the Value of Threat Intelligence To stay ahead of evolving cyber threats, it’s not just data that…

Read more
The ROI of threat intelligence: Measuring the Value Beyond Detection Blog

The ROI of threat intelligence: Measuring the Value Beyond Detection

Cybersecurity investment is a critical balancing act between cost and protection. Threat intelligence is often seen as a…

Read more
The Future of Threat Intelligence: Trends, Tools, and Tactics To Watch Blog

The Future of Threat Intelligence: Trends, Tools, and Tactics To Watch

In today’s evolving cyber landscape, threat intelligence has become a cornerstone of effective cybersecurity strategies. As cyber threats…

Read more
Core access: an analysis of the UK government’s demand to Apple  Blog

Core access: an analysis of the UK government’s demand to Apple 

What is the demand? On 7 February 2025, it was reported that the UK government had demanded that…

Read more
The BlackBasta Ransomware Leaks: What You Need to Know Blog

The BlackBasta Ransomware Leaks: What You Need to Know

Introduction  On 11 February 2025, a Telegram user called ExploitWhispers shared a ZIP file to a Russian-language Telegram…

Read more
From Initial Access to Ransomware Attack: An Analysis of Timelines from IAB Listings on Cybercriminal Forums to Extortion Attacks  Blog

From Initial Access to Ransomware Attack: An Analysis of Timelines from IAB Listings on Cybercriminal Forums to Extortion Attacks 

Introduction Cyjax monitors and analyses the initial access broker (IAB) market on the most prominent cybercriminal forums. As noted in…

Read more
How to Solve the Problem of Alert Fatigue Blog

How to Solve the Problem of Alert Fatigue

Security Operations Centre (SOC) analysts are at the forefront of cybersecurity defence, managing thousands of alerts every day….

Read more
1 2 3 13
Scroll to Top