Resources

The wider impact of the CrowdStrike outage Blog

The wider impact of the CrowdStrike outage

Introduction On Friday 19 July 2024, CrowdStrike suffered a serious outage in which over 8.5 million computers were taken…

Read more
Data-leak site emergence continues to increase  Blog

Data-leak site emergence continues to increase 

Introduction  As the threat landscape continues to develop, ransomware and data brokerage groups constantly emerge, develop, and disband….

Read more
CVE discovery, PoC Development, IAB Listings, to Ransomware Attacks: How Cybercriminal Forums Facilitate the Lifecycle Blog

CVE discovery, PoC Development, IAB Listings, to Ransomware Attacks: How Cybercriminal Forums Facilitate the Lifecycle

By Olivia Betts and Adam Price In July 2024, CloudFlare identified that it can take cybercriminals as little as 22…

Read more
UK Election – The Hacktivism Perspective  Blog

UK Election – The Hacktivism Perspective 

By Jake Keast Introduction  The UK General Election marks a monumental time in UK politics. There has been…

Read more
The Cybersecurity and Geopolitical Discussion — Vote UK — Episode 23 Blog

The Cybersecurity and Geopolitical Discussion — Vote UK — Episode 23

Geopolitical, cyber and security implications of the upcoming British election To find out, check out Episode 23 of…

Read more
Here, There, Ransomware: The Surge of New Ransomware Groups Blog

Here, There, Ransomware: The Surge of New Ransomware Groups

Introduction From late 2023 and into 2024, the ransomware ecosystem has become more diverse than ever, with an…

Read more
Cyber Threat Intelligence Update: Data Breach, Ransomware Trends, and Emerging AI Threats Blog

Cyber Threat Intelligence Update: Data Breach, Ransomware Trends, and Emerging AI Threats

This blog provides a comprehensive update on a major data breach at the UK Ministry of Defence, a…

Read more
Hacktivism Roundup Q1 2024: Warfare in the Digital World Blog

Hacktivism Roundup Q1 2024: Warfare in the Digital World

Introduction The realm of hacktivism is rapidly expanding, its contours continually shifting and adapting to the geopolitical climate….

Read more
The Cyber Threat Intelligence Analyst – Speaking Your Language Blog

The Cyber Threat Intelligence Analyst – Speaking Your Language

One issue that is raised frequently is the way in which security or IT teams struggle to speak…

Read more
“Know your attack surface, and start to use intelligence to understand what threats are most relevant to your business” Blog

“Know your attack surface, and start to use intelligence to understand what threats are most relevant to your business”

This article was originally published on Cybernews When it comes to cybersecurity and online protection, many regional ISP and…

Read more
Initial Access Brokers Explained Blog

Initial Access Brokers Explained

Author: Roman Faithfull, Cyber Intelligence Lead Introduction Initial access brokers (IABs) form a key part of the cybercriminal…

Read more
The Cybersecurity and Geopolitical Discussion — Broken China? — Episode 20 Blog

The Cybersecurity and Geopolitical Discussion — Broken China? — Episode 20

Separating fact from fiction To find out, check out Episode 20 of the Cyjax Geopolitical and Cybersecurity Podcast….

Read more
STOP ransomware spamming in Usenet Blog

STOP ransomware spamming in Usenet

Introduction Cyjax analysts have identified the distribution of STOP ransomware on Google Groups through mass spam attacks on…

Read more
The Cybersecurity and Geopolitical Discussion — The Security Year Ahead — Episode 19 Blog

The Cybersecurity and Geopolitical Discussion — The Security Year Ahead — Episode 19

The Threats Ahead: What will 2024 have in store for global security? To find out, check out Episode…

Read more
The Essentials of Cyber Security Risk Management Blog

The Essentials of Cyber Security Risk Management

As businesses have evolved, so have cybercriminals and the means they use to try and penetrate their digital…

Read more
Factors Contributing to Threat Actor Unification Blog

Factors Contributing to Threat Actor Unification

Introduction In 2022 and 2023, there has been a significant increase in threat actors uniting under singular causes….

Read more
CYMON AI Sneak Peek: A Glimpse into the Future of Threat Intelligence Blog

CYMON AI Sneak Peek: A Glimpse into the Future of Threat Intelligence

The Evolution of Cybersecurity with CYMON AI In today’s digital age, the cybersecurity landscape is more akin to…

Read more
Social Media, Shoplifting and Cybercrime Blog

Social Media, Shoplifting and Cybercrime

According to figures published in the ONS Crime Survey on 19 October, the rate of shop theft in…

Read more
Russia’s Digital Authoritarianism Tightens the Screw Over Private Sector Data Blog

Russia’s Digital Authoritarianism Tightens the Screw Over Private Sector Data

Written by: Roman Faithfull and Olivia Betts Since the start of the war, Russia has been introducing new…

Read more
Cyjax Teams Up with Cybermindz to Boost Mental Health in Cyber Teams Blog

Cyjax Teams Up with Cybermindz to Boost Mental Health in Cyber Teams

We’re thrilled to announce that we’ve partnered with Cybermindz, a not-for-profit social enterprise that focuses on improving the…

Read more
Cybersecurity in the Healthcare Sector:  Importance, Challenges and Solutions Blog

Cybersecurity in the Healthcare Sector:  Importance, Challenges and Solutions

Cybersecurity is an increasingly important issue within the healthcare sector. With the rise of digital data and technologies,…

Read more
Cyber Supply Chain Risk Management: Challenges and Best Practices  Blog

Cyber Supply Chain Risk Management: Challenges and Best Practices 

Global supply chains have become increasingly complex and vulnerable to cyber risks in recent years, with many ever-evolving…

Read more
Alert Fatigue in Cybersecurity: What Is It and how do we manage it? Blog

Alert Fatigue in Cybersecurity: What Is It and how do we manage it?

The problem of alert fatigue, also known as alarm fatigue or notification fatigue, is widely spread across various…

Read more
CYJAX Celebrates Successful Completion of First Funding Round  Blog

CYJAX Celebrates Successful Completion of First Funding Round 

London, 23 June 2023 – CYJAX, a pioneering Cyber Threat Intelligence company, is proud to announce the successful…

Read more
Scroll to Top