Resources

Initial Access Broker Market Q2 Summary Blog

Initial Access Broker Market Q2 Summary

Overview of the Initial Access Broker Market Q2 Initial Access Brokers (IABs) are a key part of the…

Read more
Uk Government Department Case Study

Uk Government Department

The Challenges The client approached CYJAX to act as an OSINT (Open-Source Intelligence) team, with a focus on…

Learn more
Global Pharmaceutical Company Case Study

Global Pharmaceutical Company

The Challenges This client became a CYJAX customer in 2012, and needed assistance with surfacing and investigating security…

Learn more
Weekly Cyber Threat Intelligence Summary Blog

Weekly Cyber Threat Intelligence Summary

Welcome to this week’s Cyber Threat Intelligence Summary, where we bring you the latest updates and insights on…

Read more
The Hacktivist Response to UK Foreign Policy Blog

The Hacktivist Response to UK Foreign Policy

Introduction Hacktivism is by its very nature reactive, as it involves the use of computer-based techniques as a…

Read more
Durov arrest and the CYJAX monitoring capability Blog

Durov arrest and the CYJAX monitoring capability

In today’s increasingly digital world, cybercrime and online criminal activities pose significant threats to individuals, businesses, and governments…

Read more
The wider impact of the CrowdStrike outage Blog

The wider impact of the CrowdStrike outage

Introduction On Friday 19 July 2024, CrowdStrike suffered a serious outage in which over 8.5 million computers were taken…

Read more
Data-leak site emergence continues to increase  Blog

Data-leak site emergence continues to increase 

Introduction  As the threat landscape continues to develop, ransomware and data brokerage groups constantly emerge, develop, and disband….

Read more
CVE discovery, PoC Development, IAB Listings, to Ransomware Attacks: How Cybercriminal Forums Facilitate the Lifecycle Blog

CVE discovery, PoC Development, IAB Listings, to Ransomware Attacks: How Cybercriminal Forums Facilitate the Lifecycle

By Olivia Betts and Adam Price In July 2024, CloudFlare identified that it can take cybercriminals as little as 22…

Read more
UK Election – The Hacktivism Perspective  Blog

UK Election – The Hacktivism Perspective 

By Jake Keast Introduction  The UK General Election marks a monumental time in UK politics. There has been…

Read more
Cloud Threat Landscape Report: Synopsis White Paper

Cloud Threat Landscape Report: Synopsis

CYJAX has published a new White Paper which explores the current threat landscape affecting the cloud, including notable threat actors, attacks, vulnerabilities and service abuses that have been observed this year.

Download
Cyber Supply Chain Attacks: Examples and how they happen White Paper

Cyber Supply Chain Attacks: Examples and how they happen

CYJAX’s Latest White Paper: Unveiling Cloud Security Threats in 2023. Explore the evolving threat landscape, prominent threat actors, recent attacks, vulnerabilities, and service abuses. Download now for expert insights.

Download
Initial Access Broker Market Summary White Paper

Initial Access Broker Market Summary

This whitepaper explores the Q1 2024 Initial Access Broker Market

Download
The Cybersecurity and Geopolitical Discussion — Vote UK — Episode 23 Blog

The Cybersecurity and Geopolitical Discussion — Vote UK — Episode 23

Geopolitical, cyber and security implications of the upcoming British election To find out, check out Episode 23 of…

Read more
Here, There, Ransomware: The Surge of New Ransomware Groups Blog

Here, There, Ransomware: The Surge of New Ransomware Groups

Introduction From late 2023 and into 2024, the ransomware ecosystem has become more diverse than ever, with an…

Read more
Cyber Threat Intelligence Update: Data Breach, Ransomware Trends, and Emerging AI Threats Blog

Cyber Threat Intelligence Update: Data Breach, Ransomware Trends, and Emerging AI Threats

This blog provides a comprehensive update on a major data breach at the UK Ministry of Defence, a…

Read more
Hacktivism Roundup Q1 2024: Warfare in the Digital World Blog

Hacktivism Roundup Q1 2024: Warfare in the Digital World

Introduction The realm of hacktivism is rapidly expanding, its contours continually shifting and adapting to the geopolitical climate….

Read more
Cryptocurrency Threat Landscape Report – Q1 2024 White Paper

Cryptocurrency Threat Landscape Report – Q1 2024

This whitepaper explores the Q1 2024 cryptocurrency landscape, highlighting Bitcoin’s surge from $42,000 to $73,000, settling around $65,000 by the quarter’s end.

Download
The Cyber Threat Intelligence Analyst – Speaking Your Language Blog

The Cyber Threat Intelligence Analyst – Speaking Your Language

One issue that is raised frequently is the way in which security or IT teams struggle to speak…

Read more
“Know your attack surface, and start to use intelligence to understand what threats are most relevant to your business” Blog

“Know your attack surface, and start to use intelligence to understand what threats are most relevant to your business”

This article was originally published on Cybernews When it comes to cybersecurity and online protection, many regional ISP and…

Read more
Initial Access Brokers Explained Blog

Initial Access Brokers Explained

Author: Roman Faithfull, Cyber Intelligence Lead Introduction Initial access brokers (IABs) form a key part of the cybercriminal…

Read more
The Cybersecurity and Geopolitical Discussion — Broken China? — Episode 20 Blog

The Cybersecurity and Geopolitical Discussion — Broken China? — Episode 20

Separating fact from fiction To find out, check out Episode 20 of the Cyjax Geopolitical and Cybersecurity Podcast….

Read more
Broken China? White Paper

Broken China?

This white paper examines China’s economic situation post-COVID-19, analysing if the recovery has stalled and the long-term implications for the world’s second-largest economy.

Download
STOP ransomware spamming in Usenet Blog

STOP ransomware spamming in Usenet

Introduction Cyjax analysts have identified the distribution of STOP ransomware on Google Groups through mass spam attacks on…

Read more
1 2 3 11
Scroll to Top