Resources Filter by: All Posts White Papers Case Studies Blog August 27, 2024 The wider impact of the CrowdStrike outage Introduction On Friday 19 July 2024, CrowdStrike suffered a serious outage in which over 8.5 million computers were taken… Read more Blog August 19, 2024 Data-leak site emergence continues to increase Introduction As the threat landscape continues to develop, ransomware and data brokerage groups constantly emerge, develop, and disband…. Read more Blog July 25, 2024 CVE discovery, PoC Development, IAB Listings, to Ransomware Attacks: How Cybercriminal Forums Facilitate the Lifecycle By Olivia Betts and Adam Price In July 2024, CloudFlare identified that it can take cybercriminals as little as 22… Read more Blog July 8, 2024 UK Election – The Hacktivism Perspective By Jake Keast Introduction The UK General Election marks a monumental time in UK politics. There has been… Read more White Paper June 25, 2024 Cloud Threat Landscape Report: Synopsis CYJAX has published a new White Paper which explores the current threat landscape affecting the cloud, including notable… Read more White Paper June 25, 2024 Cyber Supply Chain Attacks: Examples and how they happen Unlock the Secrets of Cyber Supply Chain Attacks In today’s digital landscape, businesses and organisations face an ever-increasing… Read more White Paper June 25, 2024 Initial Access Broker Market Summary Q1 2024 Initial Access Broker Market Summary In 2024, the trade of initial access to corporate networks remains… Read more Blog June 21, 2024 The Cybersecurity and Geopolitical Discussion — Vote UK — Episode 23 Geopolitical, cyber and security implications of the upcoming British election To find out, check out Episode 23 of… Read more Blog June 12, 2024 Cybercriminal Forums and the Russian Language Scene Roman F., CTI Team Lead – CYJAX Cybercriminal Forums and the Russian Language Scene Webinar Overview: Dive deep… Read more Blog May 30, 2024 Here, There, Ransomware: The Surge of New Ransomware Groups Introduction From late 2023 and into 2024, the ransomware ecosystem has become more diverse than ever, with an… Read more Blog May 16, 2024 Cyber Threat Intelligence Update: Data Breach, Ransomware Trends, and Emerging AI Threats This blog provides a comprehensive update on a major data breach at the UK Ministry of Defence, a… Read more Blog May 15, 2024 Hacktivism Roundup Q1 2024: Warfare in the Digital World Introduction The realm of hacktivism is rapidly expanding, its contours continually shifting and adapting to the geopolitical climate…. Read more White Paper April 29, 2024 DDoSaaS: An analytical overview of the DDoS-as-a-Service landscape Author: Joe Wrieden DDoSaaS: An analytical overview of the DDoS-as-a-Service landscape This whitepaper explores the evolution of DDoS… Read more White Paper April 23, 2024 Cryptocurrency Threat Landscape Report – Q1 2024 Author: Joe Wrieden Q1 2024 Cryptocurrency Landscape Review This whitepaper explores the Q1 2024 cryptocurrency landscape, highlighting Bitcoin’s… Read more Blog March 26, 2024 The Cyber Threat Intelligence Analyst – Speaking Your Language One issue that is raised frequently is the way in which security or IT teams struggle to speak… Read more Blog March 21, 2024 “Know your attack surface, and start to use intelligence to understand what threats are most relevant to your business” This article was originally published on Cybernews When it comes to cybersecurity and online protection, many regional ISP and… Read more Blog March 6, 2024 Initial Access Brokers Explained Author: Roman Faithfull, Cyber Intelligence Lead Introduction Initial access brokers (IABs) form a key part of the cybercriminal… Read more Blog March 1, 2024 The Cybersecurity and Geopolitical Discussion — Broken China? — Episode 20 Separating fact from fiction To find out, check out Episode 20 of the Cyjax Geopolitical and Cybersecurity Podcast…. Read more White Paper February 28, 2024 Broken China? Author: Nikita Cole Assessing China’s Post-COVID-19 Recovery: A White Paper Analysis This white paper examines China’s economic situation… Read more Blog February 8, 2024 STOP ransomware spamming in Usenet Introduction Cyjax analysts have identified the distribution of STOP ransomware on Google Groups through mass spam attacks on… Read more Blog January 10, 2024 The Cybersecurity and Geopolitical Discussion — The Security Year Ahead — Episode 19 The Threats Ahead: What will 2024 have in store for global security? To find out, check out Episode… Read more Blog January 9, 2024 The Essentials of Cyber Security Risk Management As businesses have evolved, so have cybercriminals and the means they use to try and penetrate their digital… Read more White Paper December 13, 2023 The Cyber Winter of Discontent Author: Roman Faithfull Western Critical National Infrastructure to be at the core of Russia’s Winter Cyber Offensive The… Read more Blog November 23, 2023 Factors Contributing to Threat Actor Unification Introduction In 2022 and 2023, there has been a significant increase in threat actors uniting under singular causes…. Read more « Previous 1 2 3 4 … 11 Next »