Resources Filter by: All Posts White Papers Case Studies White Paper June 25, 2024 Cloud Threat Landscape Report: Synopsis CYJAX has published a new White Paper which explores the current threat landscape affecting the cloud, including notable… Read more White Paper June 25, 2024 Cyber Supply Chain Attacks: Examples and how they happen Unlock the Secrets of Cyber Supply Chain Attacks In today’s digital landscape, businesses and organisations face an ever-increasing… Read more White Paper June 25, 2024 Initial Access Broker Market Summary Q1 2024 Initial Access Broker Market Summary In 2024, the trade of initial access to corporate networks remains… Read more Blog June 21, 2024 The Cybersecurity and Geopolitical Discussion — Vote UK — Episode 23 Geopolitical, cyber and security implications of the upcoming British election To find out, check out Episode 23 of… Read more Blog June 12, 2024 Cybercriminal Forums and the Russian Language Scene Roman F., CTI Team Lead – CYJAX Cybercriminal Forums and the Russian Language Scene Webinar Overview: Dive deep… Read more Blog May 30, 2024 Here, There, Ransomware: The Surge of New Ransomware Groups Introduction From late 2023 and into 2024, the ransomware ecosystem has become more diverse than ever, with an… Read more Blog May 16, 2024 Cyber Threat Intelligence Update: Data Breach, Ransomware Trends, and Emerging AI Threats This blog provides a comprehensive update on a major data breach at the UK Ministry of Defence, a… Read more Blog May 15, 2024 Hacktivism Roundup Q1 2024: Warfare in the Digital World Introduction The realm of hacktivism is rapidly expanding, its contours continually shifting and adapting to the geopolitical climate…. Read more White Paper April 29, 2024 DDoSaaS: An analytical overview of the DDoS-as-a-Service landscape Author: Joe Wrieden DDoSaaS: An analytical overview of the DDoS-as-a-Service landscape This whitepaper explores the evolution of DDoS… Read more White Paper April 23, 2024 Cryptocurrency Threat Landscape Report – Q1 2024 Author: Joe Wrieden Q1 2024 Cryptocurrency Landscape Review This whitepaper explores the Q1 2024 cryptocurrency landscape, highlighting Bitcoin’s… Read more Blog March 26, 2024 The Cyber Threat Intelligence Analyst – Speaking Your Language One issue that is raised frequently is the way in which security or IT teams struggle to speak… Read more Blog March 21, 2024 “Know your attack surface, and start to use intelligence to understand what threats are most relevant to your business” This article was originally published on Cybernews When it comes to cybersecurity and online protection, many regional ISP and… Read more Blog March 6, 2024 Initial Access Brokers Explained Author: Roman Faithfull, Cyber Intelligence Lead Introduction Initial access brokers (IABs) form a key part of the cybercriminal… Read more Blog March 1, 2024 The Cybersecurity and Geopolitical Discussion — Broken China? — Episode 20 Separating fact from fiction To find out, check out Episode 20 of the Cyjax Geopolitical and Cybersecurity Podcast…. Read more White Paper February 28, 2024 Broken China? Author: Nikita Cole Assessing China’s Post-COVID-19 Recovery: A White Paper Analysis This white paper examines China’s economic situation… Read more Blog February 8, 2024 STOP ransomware spamming in Usenet Introduction Cyjax analysts have identified the distribution of STOP ransomware on Google Groups through mass spam attacks on… Read more Blog January 10, 2024 The Cybersecurity and Geopolitical Discussion — The Security Year Ahead — Episode 19 The Threats Ahead: What will 2024 have in store for global security? To find out, check out Episode… Read more Blog January 9, 2024 The Essentials of Cyber Security Risk Management As businesses have evolved, so have cybercriminals and the means they use to try and penetrate their digital… Read more White Paper December 13, 2023 The Cyber Winter of Discontent Author: Roman Faithfull Western Critical National Infrastructure to be at the core of Russia’s Winter Cyber Offensive The… Read more Blog November 23, 2023 Factors Contributing to Threat Actor Unification Introduction In 2022 and 2023, there has been a significant increase in threat actors uniting under singular causes…. Read more Blog November 16, 2023 CYMON AI Sneak Peek: A Glimpse into the Future of Threat Intelligence The Evolution of Cybersecurity with CYMON AI In today’s digital age, the cybersecurity landscape is more akin to… Read more Blog November 15, 2023 Social Media, Shoplifting and Cybercrime According to figures published in the ONS Crime Survey on 19 October, the rate of shop theft in… Read more White Paper October 27, 2023 Cryptocurrency Threat Landscape Report – Q3 2023 Unlock the Secrets of Cryptocurrency Threats in Q3 of 2023 In today’s volatile financial landscape, cryptocurrencies are both… Read more Blog October 24, 2023 Russia’s Digital Authoritarianism Tightens the Screw Over Private Sector Data Written by: Roman Faithfull and Olivia Betts Since the start of the war, Russia has been introducing new… Read more « Previous 1 2 3 4 5 … 12 Next »