Resources

The wider impact of the CrowdStrike outage Blog

The wider impact of the CrowdStrike outage

Introduction On Friday 19 July 2024, CrowdStrike suffered a serious outage in which over 8.5 million computers were taken…

Read more
Data-leak site emergence continues to increase  Blog

Data-leak site emergence continues to increase 

Introduction  As the threat landscape continues to develop, ransomware and data brokerage groups constantly emerge, develop, and disband….

Read more
CVE discovery, PoC Development, IAB Listings, to Ransomware Attacks: How Cybercriminal Forums Facilitate the Lifecycle Blog

CVE discovery, PoC Development, IAB Listings, to Ransomware Attacks: How Cybercriminal Forums Facilitate the Lifecycle

By Olivia Betts and Adam Price In July 2024, CloudFlare identified that it can take cybercriminals as little as 22…

Read more
UK Election – The Hacktivism Perspective  Blog

UK Election – The Hacktivism Perspective 

By Jake Keast Introduction  The UK General Election marks a monumental time in UK politics. There has been…

Read more
Cloud Threat Landscape Report: Synopsis White Paper

Cloud Threat Landscape Report: Synopsis

CYJAX has published a new White Paper which explores the current threat landscape affecting the cloud, including notable…

Read more
Cyber Supply Chain Attacks: Examples and how they happen White Paper

Cyber Supply Chain Attacks: Examples and how they happen

Unlock the Secrets of Cyber Supply Chain Attacks In today’s digital landscape, businesses and organisations face an ever-increasing…

Read more
Initial Access Broker Market Summary White Paper

Initial Access Broker Market Summary

Q1 2024 Initial Access Broker Market Summary In 2024, the trade of initial access to corporate networks remains…

Read more
The Cybersecurity and Geopolitical Discussion — Vote UK — Episode 23 Blog

The Cybersecurity and Geopolitical Discussion — Vote UK — Episode 23

Geopolitical, cyber and security implications of the upcoming British election To find out, check out Episode 23 of…

Read more
Cybercriminal Forums and the Russian Language Scene Blog

Cybercriminal Forums and the Russian Language Scene

Roman F., CTI Team Lead – CYJAX Cybercriminal Forums and the Russian Language Scene Webinar Overview: Dive deep…

Read more
Here, There, Ransomware: The Surge of New Ransomware Groups Blog

Here, There, Ransomware: The Surge of New Ransomware Groups

Introduction From late 2023 and into 2024, the ransomware ecosystem has become more diverse than ever, with an…

Read more
Cyber Threat Intelligence Update: Data Breach, Ransomware Trends, and Emerging AI Threats Blog

Cyber Threat Intelligence Update: Data Breach, Ransomware Trends, and Emerging AI Threats

This blog provides a comprehensive update on a major data breach at the UK Ministry of Defence, a…

Read more
Hacktivism Roundup Q1 2024: Warfare in the Digital World Blog

Hacktivism Roundup Q1 2024: Warfare in the Digital World

Introduction The realm of hacktivism is rapidly expanding, its contours continually shifting and adapting to the geopolitical climate….

Read more
DDoSaaS: An analytical overview of the DDoS-as-a-Service landscape White Paper

DDoSaaS: An analytical overview of the DDoS-as-a-Service landscape

Author: Joe Wrieden DDoSaaS: An analytical overview of the DDoS-as-a-Service landscape This whitepaper explores the evolution of DDoS…

Read more
Cryptocurrency Threat Landscape Report – Q1 2024 White Paper

Cryptocurrency Threat Landscape Report – Q1 2024

Author: Joe Wrieden Q1 2024 Cryptocurrency Landscape Review This whitepaper explores the Q1 2024 cryptocurrency landscape, highlighting Bitcoin’s…

Read more
The Cyber Threat Intelligence Analyst – Speaking Your Language Blog

The Cyber Threat Intelligence Analyst – Speaking Your Language

One issue that is raised frequently is the way in which security or IT teams struggle to speak…

Read more
“Know your attack surface, and start to use intelligence to understand what threats are most relevant to your business” Blog

“Know your attack surface, and start to use intelligence to understand what threats are most relevant to your business”

This article was originally published on Cybernews When it comes to cybersecurity and online protection, many regional ISP and…

Read more
Initial Access Brokers Explained Blog

Initial Access Brokers Explained

Author: Roman Faithfull, Cyber Intelligence Lead Introduction Initial access brokers (IABs) form a key part of the cybercriminal…

Read more
The Cybersecurity and Geopolitical Discussion — Broken China? — Episode 20 Blog

The Cybersecurity and Geopolitical Discussion — Broken China? — Episode 20

Separating fact from fiction To find out, check out Episode 20 of the Cyjax Geopolitical and Cybersecurity Podcast….

Read more
Broken China? White Paper

Broken China?

Author: Nikita Cole Assessing China’s Post-COVID-19 Recovery: A White Paper Analysis This white paper examines China’s economic situation…

Read more
STOP ransomware spamming in Usenet Blog

STOP ransomware spamming in Usenet

Introduction Cyjax analysts have identified the distribution of STOP ransomware on Google Groups through mass spam attacks on…

Read more
The Cybersecurity and Geopolitical Discussion — The Security Year Ahead — Episode 19 Blog

The Cybersecurity and Geopolitical Discussion — The Security Year Ahead — Episode 19

The Threats Ahead: What will 2024 have in store for global security? To find out, check out Episode…

Read more
The Essentials of Cyber Security Risk Management Blog

The Essentials of Cyber Security Risk Management

As businesses have evolved, so have cybercriminals and the means they use to try and penetrate their digital…

Read more
The Cyber Winter of Discontent White Paper

The Cyber Winter of Discontent

Author: Roman Faithfull Western Critical National Infrastructure to be at the core of Russia’s Winter Cyber Offensive The…

Read more
Factors Contributing to Threat Actor Unification Blog

Factors Contributing to Threat Actor Unification

Introduction In 2022 and 2023, there has been a significant increase in threat actors uniting under singular causes….

Read more
Scroll to Top