Resources

The (near) impossibility of tracing Monero Blog

The (near) impossibility of tracing Monero

Bitcoin is not private. Due to its transparent ledger and modern blockchain analysis techniques, the tracing of transactions…

Read more
Cryptocurrency Threat Landscape Report: A Year in Review 2022 Blog

Cryptocurrency Threat Landscape Report: A Year in Review 2022

Cryptocurrency and Blockchain technologies have been one of the most prevalent and growing technology industries over the past…

Read more
Cyjax White Paper on Russia-Ukraine War: Synopsis Blog

Cyjax White Paper on Russia-Ukraine War: Synopsis

Cyjax has published a new White Paper which is divided into two distinct sections. First, it provides a…

Read more
Threat intel report: energy infrastructure on the front line Blog

Threat intel report: energy infrastructure on the front line

Energy infrastructure in Ukraine finds itself on the front line in its war with Russia as nation state…

Read more
Cyber threats and the energy sector: an overview Blog

Cyber threats and the energy sector: an overview

The major cyber threats facing the energy sector include ransomware, phishing, malware, vulnerability exploitation, supply chain issues, and…

Read more
Monthly Crypto Threat Landscape Report – November 2022 Blog

Monthly Crypto Threat Landscape Report – November 2022

November has been a rollercoaster month for the crypto landscape after we witnessed FTX, one of the largest…

Read more
The top ten financial cyber threat actors Blog

The top ten financial cyber threat actors

Due to the nature of its business and the way in which it functions, the financial sector is…

Read more
Monthly Crypto Threat Landscape Report – October 2022 Blog

Monthly Crypto Threat Landscape Report – October 2022

Introduction October held some of the most innovative attack vectors to date, with spam attacks attempting to cripple…

Read more
Fangxiao: a Chinese threat actor Blog

Fangxiao: a Chinese threat actor

Phishing campaigns continue to increase globally. These operations offer an easy route for cybercriminals to generate revenue, steal…

Read more
A comprehensive synopsis of 217 subdomain takeover reports Blog

A comprehensive synopsis of 217 subdomain takeover reports

We are living in extraordinary times. Global conflict has moved from peace time to war footing which is…

Read more
Monthly Crypto Report – September 2022 Blog

Monthly Crypto Report – September 2022

Despite a previous tumultuous month, with large-scale sanctions and clamp downs on crypto-based cybercrime, September has been no…

Read more
Cyberattacks on the utilities sector Blog

Cyberattacks on the utilities sector

Utility providers (energy, gas, water, sewage and oil) are targets for both standalone threat actors and large or…

Read more
Supply Chain Hardening Project – Lessons Learned White Paper

Supply Chain Hardening Project – Lessons Learned

Unlock the Wisdom of Supply Chain Hardening Embark on a journey through the intricacies of supply chain hardening…

Read more
Monthly Crypto Report – August 2022 Blog

Monthly Crypto Report – August 2022

August was an action-packed month in the cryptocurrency space, filled with a wide range of hacks and scams….

Read more
Kazakhstan: moving on? Blog

Kazakhstan: moving on?

There are interesting things happening in Kazakhstan, just as an important summit being attended by President Vladimir Putin…

Read more
R&D Security Report Blog

R&D Security Report

Research and Development (R&D) is a vital part of business for many companies and a significant proportion of…

Read more
Poland: The Increasing Threat of Cyber Attacks Blog

Poland: The Increasing Threat of Cyber Attacks

In common with internet users around the world, both organisations and private individuals in Poland face an increasing…

Read more
The Big Myth of Ransomware Blog

The Big Myth of Ransomware

The whole point of ransomware is to make money for malicious actors who manage to identify security weakness…

Read more
The Evolution of ISO 27001 Blog

The Evolution of ISO 27001

In October 2005, the first version of the ISO 27001 was published and essentially replaced BS7799-2 as an…

Read more
Who is Trickbot? Blog

Who is Trickbot?

Since the start of the Russia-Ukraine conflict, Russian based cybercrime groups have been placed into a difficult position….

Read more
Ten Ways to Lose Your Crypto Blog

Ten Ways to Lose Your Crypto

Cryptocurrency exchanges are the infrastructure used to transfer and exchange – as the name suggests – cryptocurrency. From…

Read more
The Kremlin’s three failures in Ukraine Blog

The Kremlin’s three failures in Ukraine

May 9 ‘Djen Pobedy’ (День Победы) is a day of huge celebration in Russia. Events take place in…

Read more
Will Food Become Russia’s Next Weapon? Blog

Will Food Become Russia’s Next Weapon?

Suddenly countries that we never spend much time thinking about are on the front lines of an epic…

Read more
Lessons Learned from Supply Chain Hardening Project Blog

Lessons Learned from Supply Chain Hardening Project

International supply chain hardening projects can be an immense undertaking for an organisation. Through experience, observation and participation,…

Read more
Scroll to Top