Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Build vs. Buy: What's the Best Threat Intelligence Approach?

Cyber threats are escalating rapidly, with the cost of global cybercrime projected to reach $10.5 trillion annually by 2025, up from $3 trillion in 2015. In response, organisations are significantly ramping up their cybersecurity investments. The global threat intelligence market size was estimated at $11.6 billion in 2023 and is expected to grow at a compound annual growth rate (CAGR) of 17.6% from 2024 to 2030. However, merely increasing budgets isn’t enough.

ARaaStocracy - RALord ransomware emerges with new DLS

The latest data leaks site (DLS) CYJAX has identified is titled RALord, which constitutes one of 14 new DLSs identified in March 2025 alone. This Ransomware-as-a-Service (RaaS) group appears to be sophisticated and professional, providing services including affiliates, data ransoms, and dark web advertisements. It has been reported that the group is active on at least one cybercriminal forum under the username ‘ForLord’.

Frag explodes onto the scene - New DLS emerges for Frag ransomware

In 2024, Cyjax observed the emergence of 72 extortion and ransomware group data-leak sites (DLSs). As of late March 2025, Cyjax has identified DLSs for 21 new groups this year, as noted in recent blogs on Morpheus, GD LockerSec, Babuk2, Linkc, Anubis, and Arkana. The latest DLS Cyjax has identified is named Frag, which constitutes one of 14 new DLSs identified in March 2025 alone.

Who broke the Internet? Arkana Security names U.S. broadband provider on new DLS

In 2024, Cyjax observed the emergence of 72 extortion and ransomware group data-leak sites (DLSs). As of late March 2025, Cyjax has identified DLSs for 19 new groups this year, as noted in recent blogs on extortion groups Morpheus, GD LockerSec, Babuk2, Linkc, and Anubis.

Top 10 Threat Intelligence Jobs in the UK

The global threat intelligence market size was valued at USD 5.80 billion in 2024. The market is projected to grow from USD 6.87 billion in 2025 to USD 24.05 billion by 2032, exhibiting a CAGR of 19.6% during the forecast period. This tremendous growth translates into an increase in both the supply and demand for skilled professionals in threat intelligence.

Ultimate Guide: Leveraging Intelligence to Prevent Card Fraud

Card fraud is evolving—fast. With unauthorised payment card fraud surpassing £275 million in the first half of 2024, businesses face increasing financial and reputational risks. Fraudsters steal physical cards, breach databases, and exploit digital channels, making fraud a low-risk, high-reward crime. The consequences? Lost revenue, customer trust, and compliance fines, with the average UK data breach now costing £3.5 million.

Maximising the Value of Threat Intelligence

To stay ahead of evolving cyber threats, it’s not just data that is needed—it is actionable intelligence. With the increasing complexity of attacks, regulatory pressures, and resource constraints, it’s essential to have a proactive approach to threat management. This whitepaper, Maximising the Value of Threat Intelligence, is a strategic, actionable guide tailored for CISOs and security teams.

The ROI of threat intelligence: Measuring the Value Beyond Detection

Cybersecurity investment is a critical balancing act between cost and protection. Threat intelligence is often seen as a crucial part of this equation, providing insights that help businesses anticipate and prevent cyber attacks. Yet when it comes to evaluating the return on investment (ROI) of threat intelligence, the focus often remains narrowly on its role in threat detection. This limited perspective misses the broader strategic value that high-quality intelligence brings.

The Future of Threat Intelligence: Trends, Tools, and Tactics To Watch

In today’s evolving cyber landscape, threat intelligence has become a cornerstone of effective cybersecurity strategies. As cyber threats grow in sophistication and frequency, understanding emerging trends, adopting advanced tools, and implementing proactive tactics are essential for organisations aiming to safeguard their digital assets. Traditionally, threat intelligence has focused on reactive measures, analysing known threats to mitigate potential damage.

Core access: an analysis of the UK government's demand to Apple

On 7 February 2025, it was reported that the UK government had demanded that Apple allow access to encrypted user data worldwide. Under current security policies, only the account holder can access the stored data in Apple’s cloud services, meaning the technology organisation itself cannot view it.