Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Sting on Bing: Bumblebee delivered through Bing SEO poisoning campaign

Bumblebee is a downloader malware which has become known for its sophistication and effectiveness. The malware was first discovered in 2022 and was believed to be a tool for ransomware groups due to the developer’s close ties with Conti. Since then, it has been used in various attacks and has been delivered through multiple methods, including phishing emails, malicious documents, and SEO poisoning.

Phishing for Victims: The Cognitive Tricks Cybercriminals Use

Most of us have encountered suspicious emails or messages; a missed delivery notification, a security alert from a bank, or an unexpected prize win. Even when these messages raise red flags, it’s not uncommon for people to open them out of curiosity or concern. This is precisely what phishing relies on. Phishing refers to a type of cybercrime where attackers use fraudulent emails, text messages, or phone calls to deceive individuals.

Building a Proactive Threat Intelligence Program: Exclusive Guide For A CISO

As cyber threats grow more advanced and persistent, traditional reactive defences are no longer enough. Today’s security leaders must shift toward proactive threat intelligence, anticipating and neutralising risks before they evolve into serious breaches.

A Brief History of Threat Intelligence: How We Got Here

Although cyber threat intelligence has become increasingly important in the modern era, driven by the exponential rise in cybercrime and global dependence on digital infrastructure, the foundational concept of threat intelligence is not a recent development. In 2024, just over four in ten businesses (43%) and three in ten charities (30%) reported experiencing some form of cybersecurity breach or attack in the previous 12 months, highlighting the scale of today’s threat landscape.

Bridging the Gap: How CISOs Can Strengthen Relationships with the Board

In today’s digitally driven world, cybersecurity is no longer just an IT concern, it’s a business imperative. Enter the Chief Information Security Officer (CISO): the executive responsible for overseeing an organisation’s information and cybersecurity strategy. From managing threats and risks to ensuring compliance and resilience, a CISO is critical in protecting a company’s digital assets and reputation.

Moving Beyond IT: The Strategic Value of Threat Intelligence for Businesses

In today’s digital-first world, cyber threats are not only increasing in volume, but they’re also becoming more targeted, coordinated, and expensive. According to IBM’s Cost of a Data Breach Report 2024, the global average data breach cost has reached USD 4.88 million, a 10% increase over last year and the highest total recorded to date.

CYJAX announces strategic partnership with Cyro Cyber to strengthen cyber threat intelligence capabilities

CYJAX, a leader in advanced threat intelligence, and Cyro Cyber, a trusted managed security services provider, are pleased to announce a strategic partnership aimed at delivering comprehensive cybersecurity solutions to organisations worldwide.

Shifting to Prevention: How Intelligence Can Stop Card Fraud in Its Tracks

Fraudsters are relentless in their pursuit, targeting physical cards, intercepting personal data, and exploiting online vulnerabilities, all with minimal risk and significant financial reward. In the first half of 2024 alone, unauthorised payment card fraud surged to over £275 million, marking a 7% increase compared to the previous year, according to UK Finance. While the risks associated with fraudsters are well understood, apprehending them remains a significant challenge.

Cyber Threat Intelligence to Counter Activist Campaigners

A new activist group is targeting insurance companies. Boycott Bloody Insurance (BBI) aims to raise awareness of the insurance industry’s role in perceived global injustices. Escalatory tactics that disrupt insurers’ day-to-day operations are possible. This may include physical threats against premises and individuals and/or logical threats, such negative social media or cyberattacks.