London, UK
2024
  |  By Shail Yadav
Alert fatigue is quietly draining security teams, slowing response times, and increasing business risk. As cyber threats rise and alerts multiply, organisations need smarter prioritisation and actionable intelligence, not more noise.
  |  By Shail Yadav
Cyber Threat Intelligence is changing fast in 2026 as organisations face AI-powered threats, rising ransomware activity, and expanding digital attack surfaces. Modern CTI is no longer about collecting data, but delivering actionable insight that helps security teams make faster, smarter decisions. Technology is evolving fast, and so is the cyber threat landscape.
  |  By Shail Yadav
Choosing a Threat Intelligence Platform? Discover the 5 key questions CISOs should ask before investing in threat intelligence software, tools, and services.
  |  By Shail Yadav
Ransomware attacks are evolving fast in 2026. Learn how attackers gain access, why businesses miss the signs, and how to stop attacks earlier.
  |  By Shail Yadav
Explore the risks and benefits of the Dark Web and learn why Dark Web monitoring is essential for identifying threats, preventing data breaches and strengthening cybersecurity.
  |  By Shail Yadav
Cyber threats are escalating rapidly, with ransomware groups multiplying and attacks becoming faster and more targeted than ever. This blog profiles four of the most active threat actors currently targeting key industries: IntelBroker, APT44 (Sandworm), Volt Typhoon, and APT45. From financially motivated cybercrime to state-sponsored espionage and infrastructure disruption, each group presents unique risks across sectors including technology, energy, government, and finance.
  |  By CYJAX
Learn how validated IOCs reduce false positives, improve SOC efficiency and give analysts time back by delivering contextual, high-confidence threat intelligence. SOC analysts begin each shift facing a relentless stream of alerts driven by indicators of compromise (IOCs). Many of these alerts are false positives, some are outdated, and only a small fraction genuinely reflect malicious activity.
  |  By Shail Yadav
As cyber threats grow and hiring slows, security leaders must scale smarter. This blog explores how to strengthen threat intelligence capabilities through automation, integration, and risk-led prioritisation, without expanding headcount.
During routine analysis, CYJAX identified a typosquatting phishing campaign which impersonated the Optical Character Recognition (OCR) tool Tesseract OCR. What originally appeared to be a ClickFix attack evolved into a sophisticated campaign delivering multi-stage malware deployments. The campaign, which CYJAX has titled OCRFix, made use of heavy obfuscation and defence evasion techniques, including EtherHiding.
  |  By Shail Yadav
AI accelerates detection, but human analysts deliver context, judgement and strategic insight. In modern cybersecurity, the real advantage lies in combining both.
  |  By CYJAX
Join Ian Thornton-Trump CD, CISO for Cyjax, as he illuminates a strategic path forward by advocating for an intelligence-led approach to DORA compliance. Discover how leveraging threat intelligence can expedite your journey towards DORA compliance, ensuring a resilient and future-ready organisational framework.
  |  By CYJAX
Step into the world of cyber warfare with cybersecurity expert Bushido Token in our exclusive interview, "The Hack - Is law enforcement winning the cyber war?" Explore the frontlines of digital defence as we delve into recent victories against ransomware groups and the relentless efforts of law enforcement to dismantle cybercrime syndicates.
  |  By CYJAX
Cyjax has partnered with Security Magazine to bring you a monthly Cybersecurity and Geopolitical vodcast hosted by Chief Information Security Officer (CISO) of Cyjax, Ian Thornton-Trump, and Tristan de Souza (Editor and Head of Communications), in which they ruminate on the enmeshing of cybersecurity and geopolitics and the new challenges and intriguing flashpoints these bring to enterprise security and risk professionals.
  |  By CYJAX
Cyjax has partnered with Security Magazine to bring you a monthly Cybersecurity and Geopolitical vodcast hosted by Chief Information Security Officer (CISO) of Cyjax, Ian Thornton-Trump, and Tristan de Souza (Editor and Head of Communications), in which they ruminate on the enmeshing of cybersecurity and geopolitics and the new challenges and intriguing flashpoints these bring to enterprise security and risk professionals.
  |  By CYJAX
A slight departure from our normal programming this month, to bring you a webinar, hosted by IT consultancy and recruitment firm Crimson, looking at the cybersecurity landscape in 2021. Our main man Ian Thornton-Trump (Cyjax's CISO) gives his pearls of wisdom, alongside two other experts in the field.
  |  By CYJAX
This report outlines Latin America and the Caribbean's history of instability but notes recent moves towards democracy and increased global interest. It highlights a shift towards closer ties with China, marked by significant investments across sectors, moving away from traditional relationships with the United States.
  |  By CYJAX
This whitepaper explores the Q1 2024 cryptocurrency landscape, highlighting Bitcoin's surge from $42,000 to $73,000, settling around $65,000 by the quarter's end. It investigates emerging threats, such as exit scams and evolving phishing tactics, and discusses the broader impact of rising cryptocurrency prices.
  |  By CYJAX
This white paper examines China's economic situation post-COVID-19, analysing if the recovery has stalled and the long-term implications for the world's second-largest economy. It looks at key economic and structural weaknesses, including declining factory activity, falling consumer prices, a struggling property sector, rising unemployment, and demographic challenges.
  |  By CYJAX
The report which analyses the conflict in Ukraine makes predictions as to how Russia may conduct cyber military activity over winter this year.
  |  By CYJAX
In today's volatile financial landscape, cryptocurrencies are both an asset and a liability. While they offer unprecedented freedom and flexibility, they also expose users to a myriad of threats ranging from regulatory shifts to malicious attacks. The landscape is shifting rapidly, and staying informed is crucial.

Cyjax is an award-winning technology company and provider of digital threat intelligence services to international corporations, law enforcement agencies and the public sector.

Using our state of the art technology and our world-class team of analysts, CYJAX monitors the Internet to identify the digital risks to your organisation from cyber threats, reputational risk, and the Darknet. CYJAX provides an Incident Response and Investigation service that provides a calming and structured approach in helping organisations when a breach does occur.

Unveiling Our Cybersecurity Prowess:

  • Manage your expanding attack surface: Cover multiple attack vectors and receive insights into supply chain risks to manage a dynamic and growing attack surface.
  • Integrate with TIP, SIEM and SOAR platforms: Scale security measures efficiently and make the most of existent resources by aggregating information under a single pane of glass.
  • Shift from reactive to proactive security: Reduce the need for reactive responses with intelligence that guides security controls adjustments based on external threat insights.

Elevate Your Risk Resilience Against Cyber Threats.