Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Phreak Out!: New Bluebox Extortion Group DLS Emerges

Another week, another extortion group data-leak site emerges. Cyjax has continued to observe the emergence of data-leak sites (DLSs) for extortion and ransomware groups. New groups FunkSec, ContFR, Argonauts, Kairos, Chort, and Termite appeared in December and November 2024 alone, bringing this year’s total up to 69. On 11 December 2024, Cyjax identified the emergence of a Tor-based DLS belonging to a new data-leak extortion group going by the name ’Bluebox’.

Meta's impact on fraud and scams

Cyjax’s open-source intelligence team has recently conducted an investigation into Meta’s impact on fraud and scams with regards to advertisements. The investigation consisted of extensive research and data collection from dark web sources, closed and open chats, social media platforms, marketplaces, and threat actor marketing forums.

How Banshee Stealer is Redefining macOS Cyber Threats and Data Theft

MacOS, often regarded for its robust security measures, has increasingly become a target for sophisticated cyber threats. Among the latest examples is Banshee Stealer, a malware engineered to compromise macOS systems by extracting sensitive user information. Developed by Russian cybercriminals and offered at a premium subscription fee of $3,000 per month, this malware underscores the growing attention of threat actors toward macOS platforms.

Why User Activity Monitoring (UAM) is a Must for SMBs

The evolution of the professional work environment and digital transformation continues to challenge the boundaries of traditional workforce management systems and practices. With 28% of workers worldwide working from home at least one day a week, gaining visibility into the digital behavior of the workforce is paramount to effective and secure management.

Webinar: Mitigating Benefit Threat through Rapid Data Processing & AI Modeling

With EBT SNAP fraud on the rise, safeguarding our most vulnerable populations is a growing challenge across the U.S. This webinar will equip you with actionable strategies to protect the integrity of EBT beneficiary cards and merchant acceptance. Learn tips and tricks related to sharing transaction data insights, detecting malicious EBT transactions with speed and accuracy, and implementing risk scoring and behavioral analysis without bias. Leave with new ideas to enhance your EBT fraud strategy efficiently and effectively--without taxing your team or your budgets.

The Cost of Being A CISO - Part: 1Personal, Professional & Organisational Challenges

Join us for part one of our two-part series examining the world of Chief Information Security Officers. This episode welcomes back Richard Cassidy, Field CISO at Rubrik, and Oliver Rochford, former Gartner analyst and founder of Cyberfuturist. This episode offers insights that will give you insight into what makes security leadership successful - and what can lead to failure.

It's Tuesday: Do You Know if You're Compromised?

How do you know that your organization is not breached at this very moment? Many threats are designed to lurk in the shadows, going undetected before causing damage and extracting confidential data from unassuming organizations. And a traditional threat hunt searching for known Indicators of Compromise (IoCs) doesn’t always detect the threats designed to evade.