CYJAX

London, UK
2024
  |  By Shail Yadav
Security Operations Centre (SOC) analysts are at the forefront of cybersecurity defence, managing thousands of alerts every day. The overwhelming volume of these notifications makes it increasingly difficult to distinguish legitimate threats from false positives, leading to analyst burnout and operational inefficiencies. Studies show that up to 62% of alerts are ignored, resulting in missed threats and the further weakening of an organisation’s security posture.
  |  By Adam Price
Cyjax monitors and analyses the initial access broker (IAB) market on the most prominent cybercriminal forums. As noted in Cyjax’s 2024 IAB market in review, it is almost certain that extortion groups, APTs, data brokers, and other threat groups use IABs to gain initial access to targeted networks. Though at first glance it is not immediately obvious how important the IAB market is to the threat landscape, Cyjax has conducted a deep analysis of public IAB listings and extortion group DLSs.
  |  By Cymon
On 11 February 2025, a Telegram user called ExploitWhispers shared a ZIP file to a Russian-language Telegram channel. The user claimed that this file contained the internal Matrix chat logs of the BlackBasta ransomware group and was captured between 18 September 2023 and 28 September 2024. The user also shared information about some of the BlackBasta members, including one of the operation’s admins, the group’s administrator, and leader Oleg Nefedov.
  |  By Shail Yadav
As cyber threats evolve in scale and sophistication, governments and regulatory bodies are tightening cybersecurity and data protection regulations. Compliance is not only about avoiding fines but also about building trust, enhancing operational resilience, and safeguarding long-term business success. Data breaches and cyberattacks can disrupt operations and as such, organisations should prioritise compliance to mitigate financial and legal risks whilst fostering customer confidence.
  |  By Shail Yadav
Artificial Intelligence (AI) is a double-edged sword in cybersecurity, empowering both defenders and attackers. AI-driven security systems are often used to detect threats in real-time, analysing large datasets for anomalies, and automating responses to cyberattacks. However, cybercriminals are also leveraging AI to create advanced malware, automate phishing attacks, and evade traditional defenses.
  |  By Adam Price
In 2024, Cyjax observed the emergence of 72 extortion and ransomware group data-leak sites (DLSs). As of late February 2025, Cyjax has identified DLSs for six new groups in 2025, as noted in recent blogs on extortion groups Kraken, Morpheus, GD LockerSec, Babuk2, and Linkc. The latest DLS which Cyjax has identified is named Anubis. This Ransomware-as-a-Service (RaaS) group appears to be sophisticated and professional, providing services including affiliates, data ransoms, and access monetisation.
  |  By Cymon
2024 saw data-leak sites (DLSs) for 72 extortion groups materialise. As of February 2025, Cyjax has identified DLSs for five new groups, as noted in recent blogs on extortion groups Kraken, Morpheus, GD LockerSec, and Babuk2. The fifth one to emerge goes by the name Linkc. Read on to find out what Cyjax knows so far about this new entrant into the data leak extortion scene.
  |  By Shail Yadav
The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework was developed in 2013 to document the tactics and techniques used by adversaries in cyberattacks. Initially an internal tool for threat detection, it became publicly available in 2015 to support the cybersecurity community. Over time, it has evolved into a comprehensive resource that describes adversary behaviours during attacks.
  |  By Shail Yadav
According to Gartner Research and McMillan (2003), “Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications, and actionable advice, about an existing or emerging hazard to assets that can inform decisions on how to respond.” Threat intelligence involves analysing data to predict and prevent cyber threats, allowing organisations to identify risks early and implement proactive defences.
  |  By Shail Yadav
Threat actors often use techniques such as phishing, lateral movement, and zero-days to gain and maintain access to systems. The increased sophistication of advanced persistent threat (APT) groups compared to other attackers means that long-term infiltration, careful exfiltration of data, and manipulation of systems without detection is often observed.
  |  By CYJAX
Join Ian Thornton-Trump CD, CISO for Cyjax, as he illuminates a strategic path forward by advocating for an intelligence-led approach to DORA compliance. Discover how leveraging threat intelligence can expedite your journey towards DORA compliance, ensuring a resilient and future-ready organisational framework.
  |  By CYJAX
Step into the world of cyber warfare with cybersecurity expert Bushido Token in our exclusive interview, "The Hack - Is law enforcement winning the cyber war?" Explore the frontlines of digital defence as we delve into recent victories against ransomware groups and the relentless efforts of law enforcement to dismantle cybercrime syndicates.
  |  By CYJAX
Cyjax has partnered with Security Magazine to bring you a monthly Cybersecurity and Geopolitical vodcast hosted by Chief Information Security Officer (CISO) of Cyjax, Ian Thornton-Trump, and Tristan de Souza (Editor and Head of Communications), in which they ruminate on the enmeshing of cybersecurity and geopolitics and the new challenges and intriguing flashpoints these bring to enterprise security and risk professionals.
  |  By CYJAX
Cyjax has partnered with Security Magazine to bring you a monthly Cybersecurity and Geopolitical vodcast hosted by Chief Information Security Officer (CISO) of Cyjax, Ian Thornton-Trump, and Tristan de Souza (Editor and Head of Communications), in which they ruminate on the enmeshing of cybersecurity and geopolitics and the new challenges and intriguing flashpoints these bring to enterprise security and risk professionals.
  |  By CYJAX
A slight departure from our normal programming this month, to bring you a webinar, hosted by IT consultancy and recruitment firm Crimson, looking at the cybersecurity landscape in 2021. Our main man Ian Thornton-Trump (Cyjax's CISO) gives his pearls of wisdom, alongside two other experts in the field.
  |  By CYJAX
This report outlines Latin America and the Caribbean's history of instability but notes recent moves towards democracy and increased global interest. It highlights a shift towards closer ties with China, marked by significant investments across sectors, moving away from traditional relationships with the United States.
  |  By CYJAX
This whitepaper explores the Q1 2024 cryptocurrency landscape, highlighting Bitcoin's surge from $42,000 to $73,000, settling around $65,000 by the quarter's end. It investigates emerging threats, such as exit scams and evolving phishing tactics, and discusses the broader impact of rising cryptocurrency prices.
  |  By CYJAX
This white paper examines China's economic situation post-COVID-19, analysing if the recovery has stalled and the long-term implications for the world's second-largest economy. It looks at key economic and structural weaknesses, including declining factory activity, falling consumer prices, a struggling property sector, rising unemployment, and demographic challenges.
  |  By CYJAX
The report which analyses the conflict in Ukraine makes predictions as to how Russia may conduct cyber military activity over winter this year.
  |  By CYJAX
In today's volatile financial landscape, cryptocurrencies are both an asset and a liability. While they offer unprecedented freedom and flexibility, they also expose users to a myriad of threats ranging from regulatory shifts to malicious attacks. The landscape is shifting rapidly, and staying informed is crucial.

Cyjax is an award-winning technology company and provider of digital threat intelligence services to international corporations, law enforcement agencies and the public sector.

Using our state of the art technology and our world-class team of analysts, CYJAX monitors the Internet to identify the digital risks to your organisation from cyber threats, reputational risk, and the Darknet. CYJAX provides an Incident Response and Investigation service that provides a calming and structured approach in helping organisations when a breach does occur.

Unveiling Our Cybersecurity Prowess:

  • Manage your expanding attack surface: Cover multiple attack vectors and receive insights into supply chain risks to manage a dynamic and growing attack surface.
  • Integrate with TIP, SIEM and SOAR platforms: Scale security measures efficiently and make the most of existent resources by aggregating information under a single pane of glass.
  • Shift from reactive to proactive security: Reduce the need for reactive responses with intelligence that guides security controls adjustments based on external threat insights.

Elevate Your Risk Resilience Against Cyber Threats.