Resources

Take Me Down to Funksec Town: Funksec Ransomware DLS Emergence  Blog

Take Me Down to Funksec Town: Funksec Ransomware DLS Emergence 

Take Me Down to Funksec Town: Funksec Ransomware DLS Emergence Cyjax has continued to observe the emergence of…

Read more
Threat Actor Recruitment: Exploiting Online Platforms to Target Employees Blog

Threat Actor Recruitment: Exploiting Online Platforms to Target Employees

CYJAX’s open-source intelligence team collects data from social media, instant messaging platforms, gated communities, and dark web locations…

Read more
Don’t Get Golden Fleeced: New Argonauts Extortion Group Emerges Blog

Don’t Get Golden Fleeced: New Argonauts Extortion Group Emerges

Following the emergence of data-leak sites (DLSs) for new extortion groups Kairos, Chort, Termite, and CONTfr, Cyjax has…

Read more
Report | An Analysis of the Reactions to the Republican Election Victory White Paper

Report | An Analysis of the Reactions to the Republican Election Victory

Come up Trumps: An Analysis of the Reactions to the Republican Election Victory This report examines the aftermath…

Read more
ContFRaversy in Ransomland: Tor-based site emerges for new French-speaking RaaS operation “ContFR”  Blog

ContFRaversy in Ransomland: Tor-based site emerges for new French-speaking RaaS operation “ContFR” 

Following the emergence of data-leak sites (DLSs) for extortion groups Kairos, Chort, and Termite, Cyjax has observed the…

Read more
The Devil and the Termite: data-leak sites emerge for Chort and Termite extortion groups Blog

The Devil and the Termite: data-leak sites emerge for Chort and Termite extortion groups

Just days after Cyjax observed the emergence of a data-leak site (DLS) for new extortion group Kairos, DLSs…

Read more
Kairos extortion group turns to initial access brokers  Blog

Kairos extortion group turns to initial access brokers 

Cyjax recently identified a new financially-motivated extortion group going by the name Kairos, which shares data stolen from…

Read more
T(AI)WANted: How the global surge in AI likely caused an increase in Taiwan-targeted cybercrime  Blog

T(AI)WANted: How the global surge in AI likely caused an increase in Taiwan-targeted cybercrime 

Introduction  Initial access brokers (IABs) facilitate access for ransomware groups, data brokers, and advanced persistent threat groups (APTs)…

Read more
An elephant in Kairos: data-leak site emerges for new extortion group Blog

An elephant in Kairos: data-leak site emerges for new extortion group

It is nearing 2025, and data-leak sites (DLSs) for extortion groups continue to emerge. November 2024 continues this…

Read more
Don’t use DirtyWords: Fake Word documents phishing Microsoft credentials  Blog

Don’t use DirtyWords: Fake Word documents phishing Microsoft credentials 

Overview  CYJAX has identified a novel phishing technique which is used to harvest Microsoft credentials via websites which…

Read more
White Paper | Initial Access Broker Market Summary Q3 White Paper

White Paper | Initial Access Broker Market Summary Q3

Q3 2024 Initial Access Broker Market Summary After analysing the IAB ecosystem in the first and second quarters…

Read more
Weekly Cyber Threat Intelligence Summary Blog

Weekly Cyber Threat Intelligence Summary

Welcome to this week’s Cyber Threat Intelligence Summary, where we bring you the latest updates and insights on…

Read more
Initial Access Broker Market Q2 Summary White Paper

Initial Access Broker Market Q2 Summary

Overview of the Initial Access Broker Market Q2 Initial Access Brokers (IABs) are a key part of the…

Read more
Uk Government Department Case Study

Uk Government Department

The Challenges The client approached CYJAX to act as an OSINT (Open-Source Intelligence) team, with a focus on…

Learn more
Global Pharmaceutical Company Case Study

Global Pharmaceutical Company

The Challenges This client became a CYJAX customer in 2012, and needed assistance with surfacing and investigating security…

Learn more
Weekly Cyber Threat Intelligence Summary Blog

Weekly Cyber Threat Intelligence Summary

Welcome to this week’s Cyber Threat Intelligence Summary, where we bring you the latest updates and insights on…

Read more
The Hacktivist Response to UK Foreign Policy Blog

The Hacktivist Response to UK Foreign Policy

Introduction Hacktivism is by its very nature reactive, as it involves the use of computer-based techniques as a…

Read more
Durov arrest and the CYJAX monitoring capability Blog

Durov arrest and the CYJAX monitoring capability

In today’s increasingly digital world, cybercrime and online criminal activities pose significant threats to individuals, businesses, and governments…

Read more
The wider impact of the CrowdStrike outage Blog

The wider impact of the CrowdStrike outage

Introduction On Friday 19 July 2024, CrowdStrike suffered a serious outage in which over 8.5 million computers were taken…

Read more
Data-leak site emergence continues to increase  Blog

Data-leak site emergence continues to increase 

Introduction  As the threat landscape continues to develop, ransomware and data brokerage groups constantly emerge, develop, and disband….

Read more
CVE discovery, PoC Development, IAB Listings, to Ransomware Attacks: How Cybercriminal Forums Facilitate the Lifecycle Blog

CVE discovery, PoC Development, IAB Listings, to Ransomware Attacks: How Cybercriminal Forums Facilitate the Lifecycle

By Olivia Betts and Adam Price In July 2024, CloudFlare identified that it can take cybercriminals as little as 22…

Read more
UK Election – The Hacktivism Perspective  Blog

UK Election – The Hacktivism Perspective 

By Jake Keast Introduction  The UK General Election marks a monumental time in UK politics. There has been…

Read more
Cloud Threat Landscape Report: Synopsis White Paper

Cloud Threat Landscape Report: Synopsis

CYJAX has published a new White Paper which explores the current threat landscape affecting the cloud, including notable…

Read more
Cyber Supply Chain Attacks: Examples and how they happen White Paper

Cyber Supply Chain Attacks: Examples and how they happen

Unlock the Secrets of Cyber Supply Chain Attacks In today’s digital landscape, businesses and organisations face an ever-increasing…

Read more
1 2 3 11
Scroll to Top