Resources Filter by: All Posts White Papers Case Studies Blog August 3, 2023 CYJAX Celebrates Successful Completion of First Funding Round London, 23 June 2023 – CYJAX, a pioneering Cyber Threat Intelligence company, is proud to announce the successful… Read more Blog July 25, 2023 Cryptocurrency Threat Landscape Report – Q2 2023 The cryptocurrency threat landscape is always evolving. Thanks to cryptocurrency existing within two distinct worlds, the financial and… Read more Blog June 15, 2023 Cyjax White Paper – Strategic Intelligence Report on Latin America and the Caribbean: Synopsis Cyjax has published a new White Paper which assesses cybersecurity practices in Latin America and the Caribbean, and… Read more Blog May 24, 2023 Threat actors targeting Israel and India Ongoing collective hacking operations such as OpIsrael, OpIran and OpIndia consist of several hacktivist threat actors working independently… Read more Blog May 2, 2023 Cyjax White Paper on Russia and China in Africa: Synopsis Cyjax has published a new White Paper which analyses the presence of China and Russia in Africa and… Read more Blog April 3, 2023 The (near) impossibility of tracing Monero Bitcoin is not private. Due to its transparent ledger and modern blockchain analysis techniques, the tracing of transactions… Read more Blog March 21, 2023 Cryptocurrency Threat Landscape Report: A Year in Review 2022 Cryptocurrency and Blockchain technologies have been one of the most prevalent and growing technology industries over the past… Read more Blog March 10, 2023 Cyjax White Paper on Russia-Ukraine War: Synopsis Cyjax has published a new White Paper which is divided into two distinct sections. First, it provides a… Read more Blog February 3, 2023 Threat intel report: energy infrastructure on the front line Energy infrastructure in Ukraine finds itself on the front line in its war with Russia as nation state… Read more Blog January 16, 2023 Cyber threats and the energy sector: an overview The major cyber threats facing the energy sector include ransomware, phishing, malware, vulnerability exploitation, supply chain issues, and… Read more Blog December 21, 2022 Monthly Crypto Threat Landscape Report – November 2022 November has been a rollercoaster month for the crypto landscape after we witnessed FTX, one of the largest… Read more Blog December 6, 2022 The top ten financial cyber threat actors Due to the nature of its business and the way in which it functions, the financial sector is… Read more Blog November 28, 2022 Monthly Crypto Threat Landscape Report – October 2022 Introduction October held some of the most innovative attack vectors to date, with spam attacks attempting to cripple… Read more Blog November 14, 2022 Fangxiao: a Chinese threat actor Phishing campaigns continue to increase globally. These operations offer an easy route for cybercriminals to generate revenue, steal… Read more Blog October 24, 2022 A comprehensive synopsis of 217 subdomain takeover reports We are living in extraordinary times. Global conflict has moved from peace time to war footing which is… Read more Blog October 17, 2022 Monthly Crypto Report – September 2022 Despite a previous tumultuous month, with large-scale sanctions and clamp downs on crypto-based cybercrime, September has been no… Read more Blog October 3, 2022 Cyberattacks on the utilities sector Utility providers (energy, gas, water, sewage and oil) are targets for both standalone threat actors and large or… Read more White Paper September 28, 2022 Supply Chain Hardening Project – Lessons Learned Unlock the Wisdom of Supply Chain Hardening Embark on a journey through the intricacies of supply chain hardening… Read more Blog September 20, 2022 Monthly Crypto Report – August 2022 August was an action-packed month in the cryptocurrency space, filled with a wide range of hacks and scams…. Read more Blog September 15, 2022 Kazakhstan: moving on? There are interesting things happening in Kazakhstan, just as an important summit being attended by President Vladimir Putin… Read more Blog September 13, 2022 R&D Security Report Research and Development (R&D) is a vital part of business for many companies and a significant proportion of… Read more Blog September 6, 2022 Poland: The Increasing Threat of Cyber Attacks In common with internet users around the world, both organisations and private individuals in Poland face an increasing… Read more Blog August 3, 2022 The Big Myth of Ransomware The whole point of ransomware is to make money for malicious actors who manage to identify security weakness… Read more Blog July 22, 2022 The Evolution of ISO 27001 In October 2005, the first version of the ISO 27001 was published and essentially replaced BS7799-2 as an… Read more « Previous 1 2 3 4 5 6 … 12 Next »