Resources Filter by: All Posts White Papers Case Studies Blog March 25, 2025 Top 10 Threat Intelligence Jobs in the UK Why Pursue a Career in Threat Intelligence? The global threat intelligence market size was valued at USD 5.80… Read more White Paper March 24, 2025 Ultimate Guide: Leveraging Intelligence to Prevent Card Fraud Ultimate Guide: Leveraging Intelligence to Prevent Card Fraud Card fraud is evolving—fast. With unauthorised payment card fraud surpassing £275… Read more Blog March 20, 2025 Beyond the Threats: The People of Cyjax Beyond the Threats: The People of Cyjax At Cyjax, our strength lies in the people who drive our… Read more White Paper March 20, 2025 Maximising the Value of Threat Intelligence Maximising the Value of Threat Intelligence To stay ahead of evolving cyber threats, it’s not just data that… Read more Blog March 19, 2025 The ROI of threat intelligence: Measuring the Value Beyond Detection Cybersecurity investment is a critical balancing act between cost and protection. Threat intelligence is often seen as a… Read more Blog March 14, 2025 The Future of Threat Intelligence: Trends, Tools, and Tactics To Watch In today’s evolving cyber landscape, threat intelligence has become a cornerstone of effective cybersecurity strategies. As cyber threats… Read more Blog March 13, 2025 Core access: an analysis of the UK government’s demand to Apple What is the demand? On 7 February 2025, it was reported that the UK government had demanded that… Read more Blog February 28, 2025 The BlackBasta Ransomware Leaks: What You Need to Know Introduction On 11 February 2025, a Telegram user called ExploitWhispers shared a ZIP file to a Russian-language Telegram… Read more Blog February 28, 2025 From Initial Access to Ransomware Attack: An Analysis of Timelines from IAB Listings on Cybercriminal Forums to Extortion Attacks Introduction Cyjax monitors and analyses the initial access broker (IAB) market on the most prominent cybercriminal forums. As noted in… Read more Blog February 28, 2025 How to Solve the Problem of Alert Fatigue Security Operations Centre (SOC) analysts are at the forefront of cybersecurity defence, managing thousands of alerts every day…. Read more Blog February 26, 2025 Using Threat Intelligence to Support Regulatory Compliance As cyber threats evolve in scale and sophistication, governments and regulatory bodies are tightening cybersecurity and data protection… Read more Blog February 25, 2025 Is that Ra? Nope, it is RaaS – DLS emerges for New Extortion Group Anubis Introduction In 2024, Cyjax observed the emergence of 72 extortion and ransomware group data-leak sites (DLSs). As of… Read more Blog February 25, 2025 The Use Of Artificial Intelligence In Threat Intelligence Artificial Intelligence (AI) is a double-edged sword in cybersecurity, empowering both defenders and attackers. AI-driven security systems are… Read more Blog February 24, 2025 Beyond the Threats: The People of Cyjax Beyond the Threats: The People of Cyjax At Cyjax, our strength lies in the people who drive our… Read more Blog February 21, 2025 How’s that for a malicious Linkc, new group launches DLS Introduction 2024 saw data-leak sites (DLSs) for 72 extortion groups materialise. As of February 2025, Cyjax has identified DLSs for… Read more Blog February 20, 2025 What is the MITRE ATT&CK Framework? The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework was developed in 2013 to document the tactics… Read more Blog February 19, 2025 A Guide to Working in Threat Intelligence What is Threat Intelligence? According to Gartner Research and McMillan (2003), “Threat intelligence is evidence-based knowledge, including context,… Read more Blog February 18, 2025 What are Advanced Persistent Threats (APTs)? Threat actors often use techniques such as phishing, lateral movement, and zero-days to gain and maintain access to… Read more Blog February 14, 2025 Top 15 Cybersecurity Events to Attend in London in 2025 As the global cybersecurity industry continues to grow, with the market projected to expand from USD 193.73 billion… Read more Blog February 12, 2025 Kraken onto the extortion scene: New Kraken DLS emerges Following the emergence of data-leak sites (DLSs) for Babuk Bjorka, GD LockerSec, and Morpheus in January 2025, a… Read more Blog February 12, 2025 The Need for Contextualised Threat Intelligence Introduction In today’s digital landscape, cyber threats are evolving at an unprecedented pace, growing more sophisticated and harder… Read more White Paper February 6, 2025 White Paper | Initial Access Broker Market 2024 In Review Initial Access Broker Market 2024 In Review Initial access brokers (IABs) have operated a specialised and lucrative market… Read more Blog January 30, 2025 New year’s reconnaissance resolutions! Cyjax operates within the dark web and ‘hidden service’ spaces to ensure a rich and current intelligence picture… Read more Blog January 29, 2025 Babuk Ba-back? Potential Return of the Infamous RaaS Group Introduction Following the emergence of data-leak sites (DLSs) for extortion groups Morpheus and GD LockerSec in January 2025, Cyjax has discovered a DLS… Read more 1 2 3 … 13 Next »