Resources

Kraken onto the extortion scene: New Kraken DLS emerges Blog

Kraken onto the extortion scene: New Kraken DLS emerges

Following the emergence of data-leak sites (DLSs) for Babuk Bjorka, GD LockerSec, and Morpheus in January 2025, a…

Read more
The Need for Contextualised Threat Intelligence  Blog

The Need for Contextualised Threat Intelligence 

Introduction  In today’s digital landscape, cyber threats are evolving at an unprecedented pace, growing more sophisticated and harder…

Read more
White Paper | Initial Access Broker Market 2024 In Review White Paper

White Paper | Initial Access Broker Market 2024 In Review

Initial Access Broker Market 2024 In Review Initial access brokers (IABs) have operated a specialised and lucrative market…

Read more
New year’s reconnaissance resolutions!  Blog

New year’s reconnaissance resolutions! 

Cyjax operates within the dark web and ‘hidden service’ spaces to ensure a rich and current intelligence picture…

Read more
Babuk Ba-back? Potential Return of the Infamous RaaS Group Blog

Babuk Ba-back? Potential Return of the Infamous RaaS Group

Introduction Following the emergence of data-leak sites (DLSs) for extortion groups Morpheus and GD LockerSec in January 2025, Cyjax has discovered a DLS…

Read more
2024 Year in Review: ransomware groups, hacktivists, and IABs targeting the Middle East Blog

2024 Year in Review: ransomware groups, hacktivists, and IABs targeting the Middle East

Key takeaways Introduction This report will provide an overview of the various extortion groups, hacktivists, and initial access…

Read more
The Ultimate Guide To Ransomware: Understanding, Identifying and Preventing Attacks Blog

The Ultimate Guide To Ransomware: Understanding, Identifying and Preventing Attacks

Ransomware is one of the most prominent cybersecurity threats today, often spreading via phishing emails, malicious links, infected…

Read more
Importance of Speed in Threat Intelligence Blog

Importance of Speed in Threat Intelligence

Introduction The threat landscape is evolving at an unprecedented rate, with organisations facing increasingly complex and malicious cyber…

Read more
A New Amazonian? Data-Leak Site Emerges for New Extortion Group GD LockerSec Blog

A New Amazonian? Data-Leak Site Emerges for New Extortion Group GD LockerSec

Following the emergence of data-leak sites (DLSs) for extortion group Morpheus earlier this year, Cyjax has discovered a…

Read more
Top 10 Threat Intelligence Jobs in the UK Blog

Top 10 Threat Intelligence Jobs in the UK

Why Pursue a Career in Threat Intelligence? The global threat intelligence market size was valued at USD 5.80…

Read more
White Paper | Initial Access Broker Market Summary Q4 White Paper

White Paper | Initial Access Broker Market Summary Q4

Q4 2024 Initial Access Broker Market Summary After analysing the IAB ecosystem in Q1, Q2, and Q3 2024,…

Read more
Time Out for TikTok: An exploration of the risks presented by the US TikTok ban  Blog

Time Out for TikTok: An exploration of the risks presented by the US TikTok ban 

Introduction  On 13 March 2024, the US House of Representatives approved a bill which demands that the China-based…

Read more
ConVErsations: Criminal Discussion of Vulnerabilities and Exploits Blog

ConVErsations: Criminal Discussion of Vulnerabilities and Exploits

Defenders often discuss security vulnerabilities on GitHub, Stack overflow, X (formerly Twitter), and other platforms to share knowledge…

Read more
Case Study | Enhancing Cybersecurity Resilience for a Leading Utility Provider Case Study

Case Study | Enhancing Cybersecurity Resilience for a Leading Utility Provider

Enhancing Cybersecurity Resilience This case study explores how a leading utility provider worked with CYJAX to enhance its…

Learn more
The Great Morpheus: New Extortion Group DLS Emerges Blog

The Great Morpheus: New Extortion Group DLS Emerges

Introduction As 2025 progresses into its second week, it has not taken long for a new data-leak site…

Read more
Cybercriminals targeting the legal sector  Blog

Cybercriminals targeting the legal sector 

The Rise in Cyber Threats Against Law Firms: A Growing Concern Cybercrime targeting law firms has surged by 77%…

Read more
Living Up to Its Name: Alleged Extortion Group LeakedData Begins to Leak Data Blog

Living Up to Its Name: Alleged Extortion Group LeakedData Begins to Leak Data

Data leaks sites (DLSs) commonly debut with a small number of claimed victims. When Cyjax discovered them, newly…

Read more
Stealer Malware and Stealer Logs Explained Blog

Stealer Malware and Stealer Logs Explained

Stealer logs and the infostealers that harvest them form a key part of the threat landscape and cybercriminal…

Read more
An Analysis of the Impact of Trump’s US Election Victory in the Middle East Blog

An Analysis of the Impact of Trump’s US Election Victory in the Middle East

Introduction  On 6 November 2024, former president and Republican candidate Donald Trump was re-elected to office in the…

Read more
Phreak Out!: New Bluebox Extortion Group DLS Emerges Blog

Phreak Out!: New Bluebox Extortion Group DLS Emerges

Another week, another extortion group data-leak site emerges. Cyjax has continued to observe the emergence of data-leak sites (DLSs) for…

Read more
Meta’s impact on fraud and scams Blog

Meta’s impact on fraud and scams

Meta’s impact on fraud and scams Cyjax’s open-source intelligence team has recently conducted an investigation into Meta’s impact…

Read more
Take Me Down to Funksec Town: Funksec Ransomware DLS Emergence  Blog

Take Me Down to Funksec Town: Funksec Ransomware DLS Emergence 

Take Me Down to Funksec Town: Funksec Ransomware DLS Emergence Cyjax has continued to observe the emergence of…

Read more
Threat Actor Recruitment: Exploiting Online Platforms to Target Employees Blog

Threat Actor Recruitment: Exploiting Online Platforms to Target Employees

CYJAX’s open-source intelligence team collects data from social media, instant messaging platforms, gated communities, and dark web locations…

Read more
Don’t Get Golden Fleeced: New Argonauts Extortion Group Emerges Blog

Don’t Get Golden Fleeced: New Argonauts Extortion Group Emerges

Following the emergence of data-leak sites (DLSs) for new extortion groups Kairos, Chort, Termite, and CONTfr, Cyjax has…

Read more
1 2 3 12
Scroll to Top