Resources

Cryptocurrency Threat Landscape Report – Q2 2023 Blog

Cryptocurrency Threat Landscape Report – Q2 2023

The cryptocurrency threat landscape is always evolving. Thanks to cryptocurrency existing within two distinct worlds, the financial and…

Read more
Cyjax White Paper – Strategic Intelligence Report on Latin America and the Caribbean: Synopsis Blog

Cyjax White Paper – Strategic Intelligence Report on Latin America and the Caribbean: Synopsis

Cyjax has published a new White Paper which assesses cybersecurity practices in Latin America and the Caribbean, and…

Read more
Strategic Intelligence Report: Latin America and the Caribbean Blog

Strategic Intelligence Report: Latin America and the Caribbean

Strategic Intelligence Report: Latin America and the Caribbean This report outlines Latin America and the Caribbean’s history of…

Read more
Threat actors targeting Israel and India Blog

Threat actors targeting Israel and India

Ongoing collective hacking operations such as OpIsrael, OpIran and OpIndia consist of several hacktivist threat actors working independently…

Read more
Cyjax White Paper on Russia and China in Africa: Synopsis Blog

Cyjax White Paper on Russia and China in Africa: Synopsis

Cyjax has published a new White Paper which analyses the presence of China and Russia in Africa and…

Read more
The (near) impossibility of tracing Monero Blog

The (near) impossibility of tracing Monero

Bitcoin is not private. Due to its transparent ledger and modern blockchain analysis techniques, the tracing of transactions…

Read more
Cryptocurrency Threat Landscape Report: A Year in Review 2022 Blog

Cryptocurrency Threat Landscape Report: A Year in Review 2022

Cryptocurrency and Blockchain technologies have been one of the most prevalent and growing technology industries over the past…

Read more
Cyjax White Paper on Russia-Ukraine War: Synopsis Blog

Cyjax White Paper on Russia-Ukraine War: Synopsis

Cyjax has published a new White Paper which is divided into two distinct sections. First, it provides a…

Read more
Threat intel report: energy infrastructure on the front line Blog

Threat intel report: energy infrastructure on the front line

Energy infrastructure in Ukraine finds itself on the front line in its war with Russia as nation state…

Read more
Cyber threats and the energy sector: an overview Blog

Cyber threats and the energy sector: an overview

The major cyber threats facing the energy sector include ransomware, phishing, malware, vulnerability exploitation, supply chain issues, and…

Read more
Monthly Crypto Threat Landscape Report – November 2022 Blog

Monthly Crypto Threat Landscape Report – November 2022

November has been a rollercoaster month for the crypto landscape after we witnessed FTX, one of the largest…

Read more
The top ten financial cyber threat actors Blog

The top ten financial cyber threat actors

Due to the nature of its business and the way in which it functions, the financial sector is…

Read more
Monthly Crypto Threat Landscape Report – October 2022 Blog

Monthly Crypto Threat Landscape Report – October 2022

Introduction October held some of the most innovative attack vectors to date, with spam attacks attempting to cripple…

Read more
Fangxiao: a Chinese threat actor Blog

Fangxiao: a Chinese threat actor

Phishing campaigns continue to increase globally. These operations offer an easy route for cybercriminals to generate revenue, steal…

Read more
A comprehensive synopsis of 217 subdomain takeover reports Blog

A comprehensive synopsis of 217 subdomain takeover reports

We are living in extraordinary times. Global conflict has moved from peace time to war footing which is…

Read more
Monthly Crypto Report – September 2022 Blog

Monthly Crypto Report – September 2022

Despite a previous tumultuous month, with large-scale sanctions and clamp downs on crypto-based cybercrime, September has been no…

Read more
Cyberattacks on the utilities sector Blog

Cyberattacks on the utilities sector

Utility providers (energy, gas, water, sewage and oil) are targets for both standalone threat actors and large or…

Read more
Monthly Crypto Report – August 2022 Blog

Monthly Crypto Report – August 2022

August was an action-packed month in the cryptocurrency space, filled with a wide range of hacks and scams….

Read more
Kazakhstan: moving on? Blog

Kazakhstan: moving on?

There are interesting things happening in Kazakhstan, just as an important summit being attended by President Vladimir Putin…

Read more
R&D Security Report Blog

R&D Security Report

Research and Development (R&D) is a vital part of business for many companies and a significant proportion of…

Read more
Poland: The Increasing Threat of Cyber Attacks Blog

Poland: The Increasing Threat of Cyber Attacks

In common with internet users around the world, both organisations and private individuals in Poland face an increasing…

Read more
The Big Myth of Ransomware Blog

The Big Myth of Ransomware

The whole point of ransomware is to make money for malicious actors who manage to identify security weakness…

Read more
The Evolution of ISO 27001 Blog

The Evolution of ISO 27001

In October 2005, the first version of the ISO 27001 was published and essentially replaced BS7799-2 as an…

Read more
Who is Trickbot? Blog

Who is Trickbot?

Since the start of the Russia-Ukraine conflict, Russian based cybercrime groups have been placed into a difficult position….

Read more
Scroll to Top