Resources Filter by: All Posts White Papers Case Studies Blog April 15, 2025 Moving Beyond IT: The Strategic Value of Threat Intelligence for Businesses In today’s digital-first world, cyber threats are not only increasing in volume, but they’re also becoming more targeted,… Read more Case Study April 9, 2025 Cyber Threat Intelligence for Law Enforcement Cybercrime is growing fast, blending old crimes with new tactics in a borderless, digital world. With low risk… Learn more Blog April 8, 2025 Shifting to Prevention: How Intelligence Can Stop Card Fraud in Its Tracks Fraudsters are relentless in their pursuit, targeting physical cards, intercepting personal data, and exploiting online vulnerabilities, all with… Read more Blog April 8, 2025 CYJAX announces strategic partnership with Cyro Cyber to strengthen cyber threat intelligence capabilities London, Monday 31st March CYJAX, a leader in advanced threat intelligence, and Cyro Cyber, a trusted managed security… Read more Blog April 7, 2025 Cyber Threat Intelligence to Counter Activist Campaigners A new activist group is targeting insurance companies. Boycott Bloody Insurance (BBI) aims to raise awareness of the… Read more Blog April 7, 2025 Initial Access Brokers Explained Introduction Initial access brokers (IABs) form a key part of the cybercriminal ecosystem. They facilitate access for ransomware… Read more Blog April 4, 2025 A DLS EMERGEncy! – Record breaking extortion group DLS emergence in 2025 Introduction As the threat landscape continues to develop, ransomware and data broker groups constantly emerge, develop, and disband…. Read more Blog April 4, 2025 Top 33 Leaders in Threat Intelligence 2025 Leadership is the backbone of any successful operation, streamlining complex processes and ensuring that teams work with clarity… Read more Blog April 3, 2025 Decoding Threat Intelligence: A Glossary The Language of Threat Intelligence Threat intelligence is a vast and evolving field that encompasses a wide range… Read more Blog April 2, 2025 Build vs. Buy: What’s the Best Threat Intelligence Approach? Cyber threats are escalating rapidly, with the cost of global cybercrime projected to reach $10.5 trillion annually by… Read more Blog March 28, 2025 ARaaStocracy – RALord ransomware emerges with new DLS Introduction The latest data leaks site (DLS) Cyjax has identified is titled RALord, which constitutes one of 14… Read more Blog March 27, 2025 RU against the Machine: The failures of machine translation for analysing Russian-language forums Introduction Russian slang such as ‘fenya’ and ‘mat’ and cybercriminal-specific dialect is used throughout hidden services, especially on forums…. Read more Blog March 26, 2025 Frag explodes onto the scene – New DLS emerges for Frag ransomware Introduction In 2024, Cyjax observed the emergence of 72 extortion and ransomware group data-leak sites (DLSs). As of… Read more Blog March 25, 2025 Who broke the Internet? Arkana Security names U.S. broadband provider on new DLS Introduction In 2024, Cyjax observed the emergence of 72 extortion and ransomware group data-leak sites (DLSs). As of… Read more Blog March 25, 2025 Top 10 Threat Intelligence Jobs in the UK Why Pursue a Career in Threat Intelligence? The global threat intelligence market size was valued at USD 5.80… Read more White Paper March 24, 2025 Ultimate Guide: Leveraging Intelligence to Prevent Card Fraud Ultimate Guide: Leveraging Intelligence to Prevent Card Fraud Card fraud is evolving—fast. With unauthorised payment card fraud surpassing £275… Read more Blog March 20, 2025 Beyond the Threats: The People of Cyjax Beyond the Threats: The People of Cyjax At Cyjax, our strength lies in the people who drive our… Read more White Paper March 20, 2025 Maximising the Value of Threat Intelligence Maximising the Value of Threat Intelligence To stay ahead of evolving cyber threats, it’s not just data that… Read more Blog March 19, 2025 The ROI of threat intelligence: Measuring the Value Beyond Detection Cybersecurity investment is a critical balancing act between cost and protection. Threat intelligence is often seen as a… Read more Blog March 14, 2025 The Future of Threat Intelligence: Trends, Tools, and Tactics To Watch In today’s evolving cyber landscape, threat intelligence has become a cornerstone of effective cybersecurity strategies. As cyber threats… Read more Blog March 13, 2025 Core access: an analysis of the UK government’s demand to Apple What is the demand? On 7 February 2025, it was reported that the UK government had demanded that… Read more Blog February 28, 2025 The BlackBasta Ransomware Leaks: What You Need to Know Introduction On 11 February 2025, a Telegram user called ExploitWhispers shared a ZIP file to a Russian-language Telegram… Read more Blog February 28, 2025 From Initial Access to Ransomware Attack: An Analysis of Timelines from IAB Listings on Cybercriminal Forums to Extortion Attacks Introduction Cyjax monitors and analyses the initial access broker (IAB) market on the most prominent cybercriminal forums. As noted in… Read more Blog February 28, 2025 How to Solve the Problem of Alert Fatigue Security Operations Centre (SOC) analysts are at the forefront of cybersecurity defence, managing thousands of alerts every day…. Read more 1 2 3 … 13 Next »