Resources

Core access: an analysis of the UK government’s demand to Apple  Blog

Core access: an analysis of the UK government’s demand to Apple 

What is the demand? On 7 February 2025, it was reported that the UK government had demanded that…

Read more
The BlackBasta Ransomware Leaks: What You Need to Know Blog

The BlackBasta Ransomware Leaks: What You Need to Know

Introduction  On 11 February 2025, a Telegram user called ExploitWhispers shared a ZIP file to a Russian-language Telegram…

Read more
From Initial Access to Ransomware Attack: An Analysis of Timelines from IAB Listings on Cybercriminal Forums to Extortion Attacks  Blog

From Initial Access to Ransomware Attack: An Analysis of Timelines from IAB Listings on Cybercriminal Forums to Extortion Attacks 

Introduction Cyjax monitors and analyses the initial access broker (IAB) market on the most prominent cybercriminal forums. As noted in…

Read more
How to Solve the Problem of Alert Fatigue Blog

How to Solve the Problem of Alert Fatigue

Security Operations Centre (SOC) analysts are at the forefront of cybersecurity defence, managing thousands of alerts every day….

Read more
Using Threat Intelligence to Support Regulatory Compliance  Blog

Using Threat Intelligence to Support Regulatory Compliance 

As cyber threats evolve in scale and sophistication, governments and regulatory bodies are tightening cybersecurity and data protection…

Read more
Is that Ra? Nope, it is RaaS – DLS emerges for New Extortion Group Anubis Blog

Is that Ra? Nope, it is RaaS – DLS emerges for New Extortion Group Anubis

Introduction In 2024, Cyjax observed the emergence of 72 extortion and ransomware group data-leak sites (DLSs). As of…

Read more
The Use Of Artificial Intelligence In Threat Intelligence Blog

The Use Of Artificial Intelligence In Threat Intelligence

Artificial Intelligence (AI) is a double-edged sword in cybersecurity, empowering both defenders and attackers. AI-driven security systems are…

Read more
Beyond the Threats: The People of Cyjax Blog

Beyond the Threats: The People of Cyjax

Beyond the Threats: The People of Cyjax At Cyjax, our strength lies in the people who drive our…

Read more
How’s that for a malicious Linkc, new group launches DLS Blog

How’s that for a malicious Linkc, new group launches DLS

Introduction  2024 saw data-leak sites (DLSs) for 72 extortion groups materialise. As of February 2025, Cyjax has identified DLSs for…

Read more
What is the MITRE ATT&CK Framework? Blog

What is the MITRE ATT&CK Framework?

The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework was developed in 2013 to document the tactics…

Read more
A Guide to Working in Threat Intelligence Blog

A Guide to Working in Threat Intelligence

What is Threat Intelligence?  According to Gartner Research and McMillan (2003), “Threat intelligence is evidence-based knowledge, including context,…

Read more
What are Advanced Persistent Threats (APTs)? Blog

What are Advanced Persistent Threats (APTs)?

Threat actors often use techniques such as phishing, lateral movement, and zero-days to gain and maintain access to…

Read more
Top 15 Cybersecurity Events to Attend in London in 2025  Blog

Top 15 Cybersecurity Events to Attend in London in 2025 

As the global cybersecurity industry continues to grow, with the market projected to expand from USD 193.73 billion…

Read more
Kraken onto the extortion scene: New Kraken DLS emerges Blog

Kraken onto the extortion scene: New Kraken DLS emerges

Following the emergence of data-leak sites (DLSs) for Babuk Bjorka, GD LockerSec, and Morpheus in January 2025, a…

Read more
The Need for Contextualised Threat Intelligence  Blog

The Need for Contextualised Threat Intelligence 

Introduction  In today’s digital landscape, cyber threats are evolving at an unprecedented pace, growing more sophisticated and harder…

Read more
White Paper | Initial Access Broker Market 2024 In Review White Paper

White Paper | Initial Access Broker Market 2024 In Review

Initial Access Broker Market 2024 In Review Initial access brokers (IABs) have operated a specialised and lucrative market…

Read more
New year’s reconnaissance resolutions!  Blog

New year’s reconnaissance resolutions! 

Cyjax operates within the dark web and ‘hidden service’ spaces to ensure a rich and current intelligence picture…

Read more
Babuk Ba-back? Potential Return of the Infamous RaaS Group Blog

Babuk Ba-back? Potential Return of the Infamous RaaS Group

Introduction Following the emergence of data-leak sites (DLSs) for extortion groups Morpheus and GD LockerSec in January 2025, Cyjax has discovered a DLS…

Read more
2024 Year in Review: ransomware groups, hacktivists, and IABs targeting the Middle East Blog

2024 Year in Review: ransomware groups, hacktivists, and IABs targeting the Middle East

Key takeaways Introduction This report will provide an overview of the various extortion groups, hacktivists, and initial access…

Read more
The Ultimate Guide To Ransomware: Understanding, Identifying and Preventing Attacks Blog

The Ultimate Guide To Ransomware: Understanding, Identifying and Preventing Attacks

Ransomware is one of the most prominent cybersecurity threats today, often spreading via phishing emails, malicious links, infected…

Read more
Importance of Speed in Threat Intelligence Blog

Importance of Speed in Threat Intelligence

Introduction The threat landscape is evolving at an unprecedented rate, with organisations facing increasingly complex and malicious cyber…

Read more
A New Amazonian? Data-Leak Site Emerges for New Extortion Group GD LockerSec Blog

A New Amazonian? Data-Leak Site Emerges for New Extortion Group GD LockerSec

Following the emergence of data-leak sites (DLSs) for extortion group Morpheus earlier this year, Cyjax has discovered a…

Read more
Top 10 Threat Intelligence Jobs in the UK Blog

Top 10 Threat Intelligence Jobs in the UK

Why Pursue a Career in Threat Intelligence? The global threat intelligence market size was valued at USD 5.80…

Read more
White Paper | Initial Access Broker Market Summary Q4 White Paper

White Paper | Initial Access Broker Market Summary Q4

Q4 2024 Initial Access Broker Market Summary After analysing the IAB ecosystem in Q1, Q2, and Q3 2024,…

Read more
Scroll to Top