Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Maximising the Value of Threat Intelligence

To stay ahead of evolving cyber threats, it’s not just data that is needed—it is actionable intelligence. With the increasing complexity of attacks, regulatory pressures, and resource constraints, it’s essential to have a proactive approach to threat management. This whitepaper, Maximising the Value of Threat Intelligence, is a strategic, actionable guide tailored for CISOs and security teams.

The ROI of threat intelligence: Measuring the Value Beyond Detection

Cybersecurity investment is a critical balancing act between cost and protection. Threat intelligence is often seen as a crucial part of this equation, providing insights that help businesses anticipate and prevent cyber attacks. Yet when it comes to evaluating the return on investment (ROI) of threat intelligence, the focus often remains narrowly on its role in threat detection. This limited perspective misses the broader strategic value that high-quality intelligence brings.

The Future of Threat Intelligence: Trends, Tools, and Tactics To Watch

In today’s evolving cyber landscape, threat intelligence has become a cornerstone of effective cybersecurity strategies. As cyber threats grow in sophistication and frequency, understanding emerging trends, adopting advanced tools, and implementing proactive tactics are essential for organisations aiming to safeguard their digital assets. Traditionally, threat intelligence has focused on reactive measures, analysing known threats to mitigate potential damage.

Core access: an analysis of the UK government's demand to Apple

On 7 February 2025, it was reported that the UK government had demanded that Apple allow access to encrypted user data worldwide. Under current security policies, only the account holder can access the stored data in Apple’s cloud services, meaning the technology organisation itself cannot view it.

How to Solve the Problem of Alert Fatigue

Security Operations Centre (SOC) analysts are at the forefront of cybersecurity defence, managing thousands of alerts every day. The overwhelming volume of these notifications makes it increasingly difficult to distinguish legitimate threats from false positives, leading to analyst burnout and operational inefficiencies. Studies show that up to 62% of alerts are ignored, resulting in missed threats and the further weakening of an organisation’s security posture.

From Initial Access to Ransomware Attack: An Analysis of Timelines from IAB Listings on Cybercriminal Forums to Extortion Attacks

Cyjax monitors and analyses the initial access broker (IAB) market on the most prominent cybercriminal forums. As noted in Cyjax’s 2024 IAB market in review, it is almost certain that extortion groups, APTs, data brokers, and other threat groups use IABs to gain initial access to targeted networks. Though at first glance it is not immediately obvious how important the IAB market is to the threat landscape, Cyjax has conducted a deep analysis of public IAB listings and extortion group DLSs.

The BlackBasta Ransomware Leaks: What You Need to Know

On 11 February 2025, a Telegram user called ExploitWhispers shared a ZIP file to a Russian-language Telegram channel. The user claimed that this file contained the internal Matrix chat logs of the BlackBasta ransomware group and was captured between 18 September 2023 and 28 September 2024. The user also shared information about some of the BlackBasta members, including one of the operation’s admins, the group’s administrator, and leader Oleg Nefedov.

Using Threat Intelligence to Support Regulatory Compliance

As cyber threats evolve in scale and sophistication, governments and regulatory bodies are tightening cybersecurity and data protection regulations. Compliance is not only about avoiding fines but also about building trust, enhancing operational resilience, and safeguarding long-term business success. Data breaches and cyberattacks can disrupt operations and as such, organisations should prioritise compliance to mitigate financial and legal risks whilst fostering customer confidence.

The Use Of Artificial Intelligence In Threat Intelligence

Artificial Intelligence (AI) is a double-edged sword in cybersecurity, empowering both defenders and attackers. AI-driven security systems are often used to detect threats in real-time, analysing large datasets for anomalies, and automating responses to cyberattacks. However, cybercriminals are also leveraging AI to create advanced malware, automate phishing attacks, and evade traditional defenses.

Is that Ra? Nope, it is RaaS - DLS emerges for New Extortion Group Anubis

In 2024, Cyjax observed the emergence of 72 extortion and ransomware group data-leak sites (DLSs). As of late February 2025, Cyjax has identified DLSs for six new groups in 2025, as noted in recent blogs on extortion groups Kraken, Morpheus, GD LockerSec, Babuk2, and Linkc. The latest DLS which Cyjax has identified is named Anubis. This Ransomware-as-a-Service (RaaS) group appears to be sophisticated and professional, providing services including affiliates, data ransoms, and access monetisation.