Resources

Cloud Threat Landscape Report: Synopsis White Paper

Cloud Threat Landscape Report: Synopsis

CYJAX has published a new White Paper which explores the current threat landscape affecting the cloud, including notable…

Read more
Cyber Supply Chain Attacks: Examples and how they happen White Paper

Cyber Supply Chain Attacks: Examples and how they happen

Unlock the Secrets of Cyber Supply Chain Attacks In today’s digital landscape, businesses and organisations face an ever-increasing…

Read more
Initial Access Broker Market Summary White Paper

Initial Access Broker Market Summary

Q1 2024 Initial Access Broker Market Summary In 2024, the trade of initial access to corporate networks remains…

Read more
The Cybersecurity and Geopolitical Discussion — Vote UK — Episode 23 Blog

The Cybersecurity and Geopolitical Discussion — Vote UK — Episode 23

Geopolitical, cyber and security implications of the upcoming British election To find out, check out Episode 23 of…

Read more
Cybercriminal Forums and the Russian Language Scene Blog

Cybercriminal Forums and the Russian Language Scene

Roman F., CTI Team Lead – CYJAX Cybercriminal Forums and the Russian Language Scene Webinar Overview: Dive deep…

Read more
Here, There, Ransomware: The Surge of New Ransomware Groups Blog

Here, There, Ransomware: The Surge of New Ransomware Groups

Introduction From late 2023 and into 2024, the ransomware ecosystem has become more diverse than ever, with an…

Read more
Cyber Threat Intelligence Update: Data Breach, Ransomware Trends, and Emerging AI Threats Blog

Cyber Threat Intelligence Update: Data Breach, Ransomware Trends, and Emerging AI Threats

This blog provides a comprehensive update on a major data breach at the UK Ministry of Defence, a…

Read more
Hacktivism Roundup Q1 2024: Warfare in the Digital World Blog

Hacktivism Roundup Q1 2024: Warfare in the Digital World

Introduction The realm of hacktivism is rapidly expanding, its contours continually shifting and adapting to the geopolitical climate….

Read more
DDoSaaS: An analytical overview of the DDoS-as-a-Service landscape White Paper

DDoSaaS: An analytical overview of the DDoS-as-a-Service landscape

Author: Joe Wrieden DDoSaaS: An analytical overview of the DDoS-as-a-Service landscape This whitepaper explores the evolution of DDoS…

Read more
Cryptocurrency Threat Landscape Report – Q1 2024 White Paper

Cryptocurrency Threat Landscape Report – Q1 2024

Author: Joe Wrieden Q1 2024 Cryptocurrency Landscape Review This whitepaper explores the Q1 2024 cryptocurrency landscape, highlighting Bitcoin’s…

Read more
The Cyber Threat Intelligence Analyst – Speaking Your Language Blog

The Cyber Threat Intelligence Analyst – Speaking Your Language

One issue that is raised frequently is the way in which security or IT teams struggle to speak…

Read more
“Know your attack surface, and start to use intelligence to understand what threats are most relevant to your business” Blog

“Know your attack surface, and start to use intelligence to understand what threats are most relevant to your business”

This article was originally published on Cybernews When it comes to cybersecurity and online protection, many regional ISP and…

Read more
Initial Access Brokers Explained Blog

Initial Access Brokers Explained

Author: Roman Faithfull, Cyber Intelligence Lead Introduction Initial access brokers (IABs) form a key part of the cybercriminal…

Read more
The Cybersecurity and Geopolitical Discussion — Broken China? — Episode 20 Blog

The Cybersecurity and Geopolitical Discussion — Broken China? — Episode 20

Separating fact from fiction To find out, check out Episode 20 of the Cyjax Geopolitical and Cybersecurity Podcast….

Read more
Broken China? White Paper

Broken China?

Author: Nikita Cole Assessing China’s Post-COVID-19 Recovery: A White Paper Analysis This white paper examines China’s economic situation…

Read more
STOP ransomware spamming in Usenet Blog

STOP ransomware spamming in Usenet

Introduction Cyjax analysts have identified the distribution of STOP ransomware on Google Groups through mass spam attacks on…

Read more
The Cybersecurity and Geopolitical Discussion — The Security Year Ahead — Episode 19 Blog

The Cybersecurity and Geopolitical Discussion — The Security Year Ahead — Episode 19

The Threats Ahead: What will 2024 have in store for global security? To find out, check out Episode…

Read more
The Essentials of Cyber Security Risk Management Blog

The Essentials of Cyber Security Risk Management

As businesses have evolved, so have cybercriminals and the means they use to try and penetrate their digital…

Read more
The Cyber Winter of Discontent White Paper

The Cyber Winter of Discontent

Author: Roman Faithfull Western Critical National Infrastructure to be at the core of Russia’s Winter Cyber Offensive The…

Read more
Factors Contributing to Threat Actor Unification Blog

Factors Contributing to Threat Actor Unification

Introduction In 2022 and 2023, there has been a significant increase in threat actors uniting under singular causes….

Read more
CYMON AI Sneak Peek: A Glimpse into the Future of Threat Intelligence Blog

CYMON AI Sneak Peek: A Glimpse into the Future of Threat Intelligence

The Evolution of Cybersecurity with CYMON AI In today’s digital age, the cybersecurity landscape is more akin to…

Read more
Social Media, Shoplifting and Cybercrime Blog

Social Media, Shoplifting and Cybercrime

According to figures published in the ONS Crime Survey on 19 October, the rate of shop theft in…

Read more
Cryptocurrency Threat Landscape Report – Q3 2023 White Paper

Cryptocurrency Threat Landscape Report – Q3 2023

Unlock the Secrets of Cryptocurrency Threats in Q3 of 2023 In today’s volatile financial landscape, cryptocurrencies are both…

Read more
Russia’s Digital Authoritarianism Tightens the Screw Over Private Sector Data Blog

Russia’s Digital Authoritarianism Tightens the Screw Over Private Sector Data

Written by: Roman Faithfull and Olivia Betts Since the start of the war, Russia has been introducing new…

Read more
Scroll to Top