Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Save Time by Using Validated IOCs, So Your Analysts Don't Have To

Learn how validated IOCs reduce false positives, improve SOC efficiency and give analysts time back by delivering contextual, high-confidence threat intelligence. SOC analysts begin each shift facing a relentless stream of alerts driven by indicators of compromise (IOCs). Many of these alerts are false positives, some are outdated, and only a small fraction genuinely reflect malicious activity.

Scaling Threat Intelligence: Building Threat Intelligence Capabilities Without Expanding Headcount

As cyber threats grow and hiring slows, security leaders must scale smarter. This blog explores how to strengthen threat intelligence capabilities through automation, integration, and risk-led prioritisation, without expanding headcount.

OCRFix: Botnet Trojan delivered through ClickFix and EtherHiding

During routine analysis, CYJAX identified a typosquatting phishing campaign which impersonated the Optical Character Recognition (OCR) tool Tesseract OCR. What originally appeared to be a ClickFix attack evolved into a sophisticated campaign delivering multi-stage malware deployments. The campaign, which CYJAX has titled OCRFix, made use of heavy obfuscation and defence evasion techniques, including EtherHiding.

CYJAX vs. SOC Radar: Different Approaches to Cyber Threat Intelligence

A detailed comparison of CYJAX and SOC Radar, exploring differences in automation, analyst-led investigations, RFIs, and intelligence depth to help security teams choose the right CTI platform. When organisations evaluate cyber threat intelligence platforms, the differences often go far beyond feature lists. They come down to philosophy, depth, and how intelligence is actually used in high-pressure environments.

Cyber Threat Intelligence Trends Financial Institutions Can't Ignore in 2026

Financial institutions face growing cyber risk as AI-driven attacks, cloud complexity, and regulatory pressure reshape the threat landscape. This blog explores the cyber threat intelligence trends shaping financial services in 2026 and what organisations need to prepare for.

Inside the Surge of Cyber Attacks Targeting Manufacturing

Manufacturing is facing a sharp rise in cyber attacks, driven by increased connectivity, IT/OT convergence, and complex supply chains. This blog explores the key threats targeting the sector and explains why proactive, intelligence-led cybersecurity is essential to protect operations and reduce risk.