Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Initial Access Brokers Explained

Initial access brokers (IABs) form a key part of the cybercriminal ecosystem. They facilitate access for ransomware groups, data leakers, and advanced persistent threat groups (APTs) into corporate networks. They are highly specialised, and professional, and operate in an established, lucrative market often characterised by rigid rules and conventions. Every ransomware attack or data breach begins with initial access, following the reconnaissance phase of an attack.

The Cybersecurity and Geopolitical Discussion - Broken China? - Episode 20

To find out, check out Episode 20 of the Cyjax Geopolitical and Cybersecurity Podcast. Here’s a summary of what’s on the table… In the latest episode of the Cybersecurity & Geopolitical Discussion, the hosts Ian Thornton-Trump CD, CISO for Cyjax, Lisa Forte of Red Goat Security and Philip Ingram MBE of Grey Hare Media, delve into the complexities of China’s image from an outsider’s perspective.

STOP ransomware spamming in Usenet

Cyjax analysts have identified the distribution of STOP ransomware on Google Groups through mass spam attacks on Usenet. Over 385,000 posts have been observed, which contain malicious links resulting in ransomware infection. This campaign, henceforth referred to as “STOPNET.GG”, has been in operation since at least May 2023, and is ongoing at the time of writing.

The Cybersecurity and Geopolitical Discussion - The Security Year Ahead - Episode 19

To find out, check out Episode 19 of the Cyjax Geopolitical and Cybersecurity Podcast. Here’s a summary of what’s on the table… A new year brings new threats! So join our CISO Ian Thornton-Trump CD and his guests Lisa Forte, Partner at Red Goat Security and Philip Ingram MBE of Grey Hare Media, for expert analysis of how some of the more compelling world events set to take place this year could impact global stability and security.

The Essentials of Cyber Security Risk Management

As businesses have evolved, so have cybercriminals and the means they use to try and penetrate their digital assets. Every day, new threats arise and unscrupulous organisations create means to attack physical networks, cloud services, and other key business functions and this is why having a robust cyber security risk management plan is critical.