CYJAX

London, UK
2024
  |  By Chris Spinks
Cyjax operates within the dark web and ‘hidden service’ spaces to ensure a rich and current intelligence picture for its clients, enabling them to understand the changing threat landscape and prepare for incoming attacks and mitigate existing ones. Predicting an attack can be difficult, but fun!
  |  By Jovana Macakanja
This report will provide an overview of the various extortion groups, hacktivists, and initial access brokers (IABs) targeting the Middle East throughout 2024 and highlight the relevant observed trends. Specifically, this report will look at incidents affecting Egypt, Iran, Iraq, Saudi Arabia, Yemen, Syria, Jordan, United Arab Emirates, Israel, Lebanon, Oman, Kuwait, Qatar, and Bahrain.
  |  By Jovana Macakanja
Following the emergence of data-leak sites (DLSs) for extortion group’s Morpheus and GD LockerSec in January 2025, Cyjax has discovered a DLS which claims that the infamous Babuk ransomware group has returned. Read on to find out what we know so far.
  |  By Shail Yadav
Ransomware is one of the most prominent cybersecurity threats today, often spreading via phishing emails, malicious links, infected attachments, or exploiting software vulnerabilities. It is a type of malware designed to block access to files, data, or entire systems until a ransom is paid, usually in cryptocurrency. Beyond the financial impact, ransomware causes operational disruption and long-term reputational damage. The frequency and scale of ransomware attacks have surged in recent years.
  |  By Roman Faithfull
Following the emergence of data-leak sites (DLSs) for extortion group Morpheus earlier this year, Cyjax has discovered a DLS for a new extortion outfit going by the name GD LockerSec. Read on to find out what we know so far.
  |  By Shail Yadav
The threat landscape is evolving at an unprecedented rate, with organisations facing increasingly complex and malicious cyber threats. As cyber-attacks grow in frequency and sophistication, Cyber Threat Intelligence (CTI) has emerged as a critical focus for many organisations striving to counter these rising challenges effectively.
  |  By Shail Yadav
The global threat intelligence market size was valued at USD 5.80 billion in 2024. The market is projected to grow from USD 6.87 billion in 2025 to USD 24.05 billion by 2032, exhibiting a CAGR of 19.6% during the forecast period. This tremendous growth translates into an increase in both the supply and demand for skilled professionals in threat intelligence.
  |  By Jovana Macakanja
Defenders often discuss security vulnerabilities on GitHub, Stack overflow, X (formerly Twitter), and other platforms to share knowledge of these threats and ensure users know when patches are available. Cybercriminals have a similar process, choosing to share vulnerability news, exploit code, and engage in technical discussions on cybercriminal forums. However, in contrast to defenders, these threat actors share this knowledge for the purpose finding unpatched systems and exploiting them.
  |  By Joe Wrieden
On 13 March 2024, the US House of Representatives approved a bill which demands that the China-based ByteDance divests the popular social media platform TikTok, effectively banning it in the country. The measure was passed with a 352 to 65 vote after being introduced on 5 March 2024 by Republican Mike Gallagher and Democrat Raja Krishnamoorthi.
  |  By Roman Faithfull
As 2025 progresses into its second week, it has not taken long for a new data-leak site (DLS) for an extortion group to emerge. December 2024 saw the emergence of LeakedData, FunkSec, and Bluebox. This week, the new group goes by the name Morpheus. Read on to find out what Cyjax knows about this new entrant into the extortion scene so far.
  |  By CYJAX
Join Ian Thornton-Trump CD, CISO for Cyjax, as he illuminates a strategic path forward by advocating for an intelligence-led approach to DORA compliance. Discover how leveraging threat intelligence can expedite your journey towards DORA compliance, ensuring a resilient and future-ready organisational framework.
  |  By CYJAX
Step into the world of cyber warfare with cybersecurity expert Bushido Token in our exclusive interview, "The Hack - Is law enforcement winning the cyber war?" Explore the frontlines of digital defence as we delve into recent victories against ransomware groups and the relentless efforts of law enforcement to dismantle cybercrime syndicates.
  |  By CYJAX
Cyjax has partnered with Security Magazine to bring you a monthly Cybersecurity and Geopolitical vodcast hosted by Chief Information Security Officer (CISO) of Cyjax, Ian Thornton-Trump, and Tristan de Souza (Editor and Head of Communications), in which they ruminate on the enmeshing of cybersecurity and geopolitics and the new challenges and intriguing flashpoints these bring to enterprise security and risk professionals.
  |  By CYJAX
Cyjax has partnered with Security Magazine to bring you a monthly Cybersecurity and Geopolitical vodcast hosted by Chief Information Security Officer (CISO) of Cyjax, Ian Thornton-Trump, and Tristan de Souza (Editor and Head of Communications), in which they ruminate on the enmeshing of cybersecurity and geopolitics and the new challenges and intriguing flashpoints these bring to enterprise security and risk professionals.
  |  By CYJAX
A slight departure from our normal programming this month, to bring you a webinar, hosted by IT consultancy and recruitment firm Crimson, looking at the cybersecurity landscape in 2021. Our main man Ian Thornton-Trump (Cyjax's CISO) gives his pearls of wisdom, alongside two other experts in the field.
  |  By CYJAX
This report outlines Latin America and the Caribbean's history of instability but notes recent moves towards democracy and increased global interest. It highlights a shift towards closer ties with China, marked by significant investments across sectors, moving away from traditional relationships with the United States.
  |  By CYJAX
This whitepaper explores the Q1 2024 cryptocurrency landscape, highlighting Bitcoin's surge from $42,000 to $73,000, settling around $65,000 by the quarter's end. It investigates emerging threats, such as exit scams and evolving phishing tactics, and discusses the broader impact of rising cryptocurrency prices.
  |  By CYJAX
This white paper examines China's economic situation post-COVID-19, analysing if the recovery has stalled and the long-term implications for the world's second-largest economy. It looks at key economic and structural weaknesses, including declining factory activity, falling consumer prices, a struggling property sector, rising unemployment, and demographic challenges.
  |  By CYJAX
The report which analyses the conflict in Ukraine makes predictions as to how Russia may conduct cyber military activity over winter this year.
  |  By CYJAX
In today's volatile financial landscape, cryptocurrencies are both an asset and a liability. While they offer unprecedented freedom and flexibility, they also expose users to a myriad of threats ranging from regulatory shifts to malicious attacks. The landscape is shifting rapidly, and staying informed is crucial.

Cyjax is an award-winning technology company and provider of digital threat intelligence services to international corporations, law enforcement agencies and the public sector.

Using our state of the art technology and our world-class team of analysts, CYJAX monitors the Internet to identify the digital risks to your organisation from cyber threats, reputational risk, and the Darknet. CYJAX provides an Incident Response and Investigation service that provides a calming and structured approach in helping organisations when a breach does occur.

Unveiling Our Cybersecurity Prowess:

  • Manage your expanding attack surface: Cover multiple attack vectors and receive insights into supply chain risks to manage a dynamic and growing attack surface.
  • Integrate with TIP, SIEM and SOAR platforms: Scale security measures efficiently and make the most of existent resources by aggregating information under a single pane of glass.
  • Shift from reactive to proactive security: Reduce the need for reactive responses with intelligence that guides security controls adjustments based on external threat insights.

Elevate Your Risk Resilience Against Cyber Threats.