Resources

How’s that for a malicious Linkc, new group launches DLS Blog

How’s that for a malicious Linkc, new group launches DLS

Introduction  2024 saw data-leak sites (DLSs) for 72 extortion groups materialise. As of February 2025, Cyjax has identified DLSs for…

Read more
What is the MITRE ATT&CK Framework? Blog

What is the MITRE ATT&CK Framework?

The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework was developed in 2013 to document the tactics…

Read more
A Guide to Working in Threat Intelligence Blog

A Guide to Working in Threat Intelligence

What is Threat Intelligence?  According to Gartner Research and McMillan (2003), “Threat intelligence is evidence-based knowledge, including context,…

Read more
What are Advanced Persistent Threats (APTs)? Blog

What are Advanced Persistent Threats (APTs)?

Threat actors often use techniques such as phishing, lateral movement, and zero-days to gain and maintain access to…

Read more
Top 15 Cybersecurity Events to Attend in London in 2025  Blog

Top 15 Cybersecurity Events to Attend in London in 2025 

As the global cybersecurity industry continues to grow, with the market projected to expand from USD 193.73 billion…

Read more
Kraken onto the extortion scene: New Kraken DLS emerges Blog

Kraken onto the extortion scene: New Kraken DLS emerges

Following the emergence of data-leak sites (DLSs) for Babuk Bjorka, GD LockerSec, and Morpheus in January 2025, a…

Read more
The Need for Contextualised Threat Intelligence  Blog

The Need for Contextualised Threat Intelligence 

Introduction  In today’s digital landscape, cyber threats are evolving at an unprecedented pace, growing more sophisticated and harder…

Read more
White Paper | Initial Access Broker Market 2024 In Review White Paper

White Paper | Initial Access Broker Market 2024 In Review

Initial Access Broker Market 2024 In Review Initial access brokers (IABs) have operated a specialised and lucrative market…

Read more
New year’s reconnaissance resolutions!  Blog

New year’s reconnaissance resolutions! 

Cyjax operates within the dark web and ‘hidden service’ spaces to ensure a rich and current intelligence picture…

Read more
Babuk Ba-back? Potential Return of the Infamous RaaS Group Blog

Babuk Ba-back? Potential Return of the Infamous RaaS Group

Introduction Following the emergence of data-leak sites (DLSs) for extortion groups Morpheus and GD LockerSec in January 2025, Cyjax has discovered a DLS…

Read more
2024 Year in Review: ransomware groups, hacktivists, and IABs targeting the Middle East Blog

2024 Year in Review: ransomware groups, hacktivists, and IABs targeting the Middle East

Key takeaways Introduction This report will provide an overview of the various extortion groups, hacktivists, and initial access…

Read more
The Ultimate Guide To Ransomware: Understanding, Identifying and Preventing Attacks Blog

The Ultimate Guide To Ransomware: Understanding, Identifying and Preventing Attacks

Ransomware is one of the most prominent cybersecurity threats today, often spreading via phishing emails, malicious links, infected…

Read more
Importance of Speed in Threat Intelligence Blog

Importance of Speed in Threat Intelligence

Introduction The threat landscape is evolving at an unprecedented rate, with organisations facing increasingly complex and malicious cyber…

Read more
A New Amazonian? Data-Leak Site Emerges for New Extortion Group GD LockerSec Blog

A New Amazonian? Data-Leak Site Emerges for New Extortion Group GD LockerSec

Following the emergence of data-leak sites (DLSs) for extortion group Morpheus earlier this year, Cyjax has discovered a…

Read more
Top 10 Threat Intelligence Jobs in the UK Blog

Top 10 Threat Intelligence Jobs in the UK

Why Pursue a Career in Threat Intelligence? The global threat intelligence market size was valued at USD 5.80…

Read more
White Paper | Initial Access Broker Market Summary Q4 White Paper

White Paper | Initial Access Broker Market Summary Q4

Q4 2024 Initial Access Broker Market Summary After analysing the IAB ecosystem in Q1, Q2, and Q3 2024,…

Read more
Time Out for TikTok: An exploration of the risks presented by the US TikTok ban  Blog

Time Out for TikTok: An exploration of the risks presented by the US TikTok ban 

Introduction  On 13 March 2024, the US House of Representatives approved a bill which demands that the China-based…

Read more
ConVErsations: Criminal Discussion of Vulnerabilities and Exploits Blog

ConVErsations: Criminal Discussion of Vulnerabilities and Exploits

Defenders often discuss security vulnerabilities on GitHub, Stack overflow, X (formerly Twitter), and other platforms to share knowledge…

Read more
Case Study | Enhancing Cybersecurity Resilience for a Leading Utility Provider Case Study

Case Study | Enhancing Cybersecurity Resilience for a Leading Utility Provider

Enhancing Cybersecurity Resilience This case study explores how a leading utility provider worked with CYJAX to enhance its…

Learn more
The Great Morpheus: New Extortion Group DLS Emerges Blog

The Great Morpheus: New Extortion Group DLS Emerges

Introduction As 2025 progresses into its second week, it has not taken long for a new data-leak site…

Read more
Cybercriminals targeting the legal sector  Blog

Cybercriminals targeting the legal sector 

The Rise in Cyber Threats Against Law Firms: A Growing Concern Cybercrime targeting law firms has surged by 77%…

Read more
Living Up to Its Name: Alleged Extortion Group LeakedData Begins to Leak Data Blog

Living Up to Its Name: Alleged Extortion Group LeakedData Begins to Leak Data

Data leaks sites (DLSs) commonly debut with a small number of claimed victims. When Cyjax discovered them, newly…

Read more
Stealer Malware and Stealer Logs Explained Blog

Stealer Malware and Stealer Logs Explained

Stealer logs and the infostealers that harvest them form a key part of the threat landscape and cybercriminal…

Read more
An Analysis of the Impact of Trump’s US Election Victory in the Middle East Blog

An Analysis of the Impact of Trump’s US Election Victory in the Middle East

Introduction  On 6 November 2024, former president and Republican candidate Donald Trump was re-elected to office in the…

Read more
1 2 3 12
Scroll to Top