www.cyjax.com
Open in
urlscan Pro
2606:4700:20::ac43:4b32
Public Scan
Submitted URL: https://cyjax.co.uk/
Effective URL: https://www.cyjax.com/
Submission: On March 07 via api from US — Scanned from US
Effective URL: https://www.cyjax.com/
Submission: On March 07 via api from US — Scanned from US
Form analysis
1 forms found in the DOMPOST https://forms-eu1.hsforms.com/submissions/v3/public/submit/formsnext/multipart/25481865/d70a5de2-3869-4bd7-9cee-1c7d5a2ab832
<form id="hsForm_d70a5de2-3869-4bd7-9cee-1c7d5a2ab832" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms-eu1.hsforms.com/submissions/v3/public/submit/formsnext/multipart/25481865/d70a5de2-3869-4bd7-9cee-1c7d5a2ab832"
class="hs-form-private hsForm_d70a5de2-3869-4bd7-9cee-1c7d5a2ab832 hs-form-d70a5de2-3869-4bd7-9cee-1c7d5a2ab832 hs-form-d70a5de2-3869-4bd7-9cee-1c7d5a2ab832_24d260d1-72cc-4ad6-a135-22a3072bd327 hs-form stacked"
target="target_iframe_d70a5de2-3869-4bd7-9cee-1c7d5a2ab832" data-instance-id="24d260d1-72cc-4ad6-a135-22a3072bd327" data-form-id="d70a5de2-3869-4bd7-9cee-1c7d5a2ab832" data-portal-id="25481865"
data-test-id="hsForm_d70a5de2-3869-4bd7-9cee-1c7d5a2ab832" data-hs-cf-bound="true">
<fieldset class="form-columns-2">
<div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field"><label id="label-firstname-d70a5de2-3869-4bd7-9cee-1c7d5a2ab832" class="" placeholder="Enter your "
for="firstname-d70a5de2-3869-4bd7-9cee-1c7d5a2ab832"><span></span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="firstname-d70a5de2-3869-4bd7-9cee-1c7d5a2ab832" name="firstname" required="" placeholder="First name*" type="text" class="hs-input" inputmode="text" autocomplete="given-name" value=""></div>
</div>
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-d70a5de2-3869-4bd7-9cee-1c7d5a2ab832" class="" placeholder="Enter your " for="email-d70a5de2-3869-4bd7-9cee-1c7d5a2ab832"><span></span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-d70a5de2-3869-4bd7-9cee-1c7d5a2ab832" name="email" required="" placeholder="Work Email*" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="legal-consent-container">
<div>
<div class="hs-dependent-field">
<div class="hs_LEGAL_CONSENT.subscription_type_129780742 hs-LEGAL_CONSENT.subscription_type_129780742 hs-fieldtype-booleancheckbox field hs-form-field">
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input">
<ul class="inputs-list" required="">
<li class="hs-form-booleancheckbox"><label for="LEGAL_CONSENT.subscription_type_129780742-d70a5de2-3869-4bd7-9cee-1c7d5a2ab832" class="hs-form-booleancheckbox-display"><input
id="LEGAL_CONSENT.subscription_type_129780742-d70a5de2-3869-4bd7-9cee-1c7d5a2ab832" class="hs-input" type="checkbox" name="LEGAL_CONSENT.subscription_type_129780742" value="true"><span>
<p>I agree to receive other communications from Cyjax. <a href="https://www.cyjax.com/privacy-policy/" target="_blank" rel="noopener">Privacy Policy</a></p><span class="hs-form-required">*</span>
</span></label></li>
</ul>
</div>
</div>
</div>
<legend class="hs-field-desc checkbox-desc" style="display: none;"></legend>
</div>
</div>
</fieldset>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="Submit"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1709830037423","formDefinitionUpdatedAt":"1696410193937","lang":"en","legalConsentOptions":"{\"legitimateInterestSubscriptionTypes\":[129780742],\"communicationConsentCheckboxes\":[{\"communicationTypeId\":129780742,\"label\":\"<p>I agree to receive other communications from Cyjax. <a href=\\\"https://www.cyjax.com/privacy-policy/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">Privacy Policy</a></p>\",\"required\":true}],\"legitimateInterestLegalBasis\":\"LEGITIMATE_INTEREST_PQL\",\"processingConsentType\":\"IMPLICIT\",\"processingConsentCheckboxLabel\":\"I agree to allow www.cyjax.com to store and process my personal data.\",\"isLegitimateInterest\":false}","embedType":"REGULAR","clonedFromForm":"58730371-cb69-4095-a987-f36118d785e3","notifyHubSpotOwner":"true","renderRawHtml":"true","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.111 Safari/537.36","pageTitle":"Threat Intelligence Vendor | CYJAX","pageUrl":"https://www.cyjax.com/","isHubSpotCmsGeneratedPage":false,"hutk":"263bb9d57bc1fa9d0a261ab7157c981b","__hsfp":3281433755,"__hssc":"14164584.1.1709830038773","__hstc":"14164584.263bb9d57bc1fa9d0a261ab7157c981b.1709830038771.1709830038771.1709830038771.1","formTarget":"#hbspt-form-24d260d1-72cc-4ad6-a135-22a3072bd327","boolCheckBoxFields":"LEGAL_CONSENT.subscription_type_129780742","rumScriptExecuteTime":2895.1000003814697,"rumTotalRequestTime":3558.1000003814697,"rumTotalRenderTime":3582,"rumServiceResponseTime":663,"rumFormRenderTime":23.899999618530273,"connectionType":"4g","firstContentfulPaint":0,"largestContentfulPaint":0,"locale":"en","timestamp":1709830038788,"originalEmbedContext":{"portalId":"25481865","formId":"d70a5de2-3869-4bd7-9cee-1c7d5a2ab832","region":"eu1","target":"#hbspt-form-24d260d1-72cc-4ad6-a135-22a3072bd327","isBuilder":false,"isTestPage":false,"isPreview":false,"isMobileResponsive":true},"correlationId":"24d260d1-72cc-4ad6-a135-22a3072bd327","renderedFieldsIds":["firstname","email","LEGAL_CONSENT.subscription_type_129780742"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.4774","sourceName":"forms-embed","sourceVersion":"1.4774","sourceVersionMajor":"1","sourceVersionMinor":"4774","allPageIds":{},"_debug_embedLogLines":[{"clientTimestamp":1709830037547,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"Threat Intelligence Vendor | CYJAX\",\"pageUrl\":\"https://www.cyjax.com/\",\"userAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.111 Safari/537.36\",\"isHubSpotCmsGeneratedPage\":false}"},{"clientTimestamp":1709830037549,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"US\""},{"clientTimestamp":1709830038783,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"263bb9d57bc1fa9d0a261ab7157c981b\"}"}]}"><iframe
name="target_iframe_d70a5de2-3869-4bd7-9cee-1c7d5a2ab832" style="display: none;"></iframe>
</form>
Text Content
We value your privacy We use cookies to enhance your browsing experience, serve content, and analyse our traffic. By clicking "Accept All", you consent to our use of cookies. More Information Customise Reject All Accept All Customize Consent Preferences We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below. The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... Show more NecessaryAlways Active Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data. * Cookie __hssrc * Duration session * Description This cookie is set by Hubspot whenever it changes the session cookie. The __hssrc cookie set to 1 indicates that the user has restarted the browser, and if the cookie does not exist, it is assumed to be a new session. * Cookie JSESSIONID * Duration session * Description The JSESSIONID cookie is used by New Relic to store a session identifier so that New Relic can monitor session counts for an application. * Cookie cookieyes-consent * Duration 1 year * Description CookieYes sets this cookie to remember users' consent preferences so that their preferences are respected on their subsequent visits to this site. It does not collect or store any personal information of the site visitors. * Cookie hs-messages-is-open * Duration 30 minutes * Description This cookie is used on the visitor UI side so HubSpot can determine/save whether the chat widget is open for future visits. It resets after 30 minutes to re-close the widget after 30 minutes of inactivity. It contains a Boolean value of True if present. * Cookie hs-messages-hide-welcome-message * Duration 1 day * Description When you dismiss the welcome message in your messages tool, a cookie is set to prevent it from appearing again for one day. It contains a Boolean value of True or False. * Cookie csrf.app * Duration session * Description Cross Site Request Forgery prevention * Cookie hubspotapi_csrf * Duration 1 year * Description This is used for Cross Site Request Forgery prevention - preventing third party websites from accessing your data * Cookie content_cookie * Duration 1 month * Description This cookie is set when you access any gated content on our website. * Cookie cf_clearance * Duration 30 minutes * Description This cookie is used to present the visitor with a challenge with the aim to filter out bots and potential malicious users. Functional Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features. * Cookie __cf_bm * Duration 1 hour * Description This cookie, set by Cloudflare, is used to support Cloudflare Bot Management. * Cookie messagesUtk * Duration 6 months * Description HubSpot sets this cookie to recognize visitors who chat via the chatflows tool. * Cookie __hssc * Duration 1 hour * Description HubSpot sets this cookie to keep track of sessions and to determine if HubSpot should increment the session number and timestamps in the __hstc cookie. * Cookie hubspotapi * Duration Session * Description This cookie allows the user to access the app with the correct permissions. * Cookie hubspotapi_prefs * Duration 1 year * Description This is used with the hubspotapi cookie to remember whether the user checked the "remember me" box (controls the expiration of the main cookie's authentication). * Cookie catAccCookies * Duration 30 days * Description Stores cookie consent preferences * Cookie _cfuvid * Duration session * Description This cookie is a part of the services provided by Cloudflare - Including load-balancing, deliverance of website content and serving DNS connection for website operators. Analytics Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc. * Cookie _ga * Duration 1 year 1 month 4 days * Description The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. * Cookie __hstc * Duration 6 months * Description This is the main cookie set by Hubspot, for tracking visitors. It contains the domain, initial timestamp (first visit), last timestamp (last visit), current timestamp (this visit), and session number (increments for each subsequent session). * Cookie hubspotutk * Duration 6 months * Description HubSpot sets this cookie to keep track of the visitors to the website. This cookie is passed to HubSpot on form submission and used when deduplicating contacts. * Cookie _ga_* * Duration 1 year 1 month 4 days * Description Google Analytics sets this cookie to store and count page views. * Cookie _gcl_au * Duration 3 months * Description Google Tag Manager sets the cookie to experiment advertisement efficiency of websites using their services. Performance Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors. No cookies to display. Advertisement Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns. * Cookie test_cookie * Duration 15 minutes * Description doubleclick.net sets this cookie to determine if the user's browser supports cookies. * Cookie yt-remote-device-id * Duration never * Description YouTube sets this cookie to store the user's video preferences using embedded YouTube videos. * Cookie yt-remote-connected-devices * Duration never * Description YouTube sets this cookie to store the user's video preferences using embedded YouTube videos. * Cookie IDE * Duration 389 days * Description Used by Google DoubleClick to register and report your actions after you view or click on one of the advertiser's adverts. This cookie is set with the purpose of measuring the efficiency of an advert and to present targeted adverts to you. * Cookie IDE * Duration 389 days * Description Used by Google DoubleClick to register and report your actions after you view or click on one of the advertiser's adverts. This cookie is set with the purpose of measuring the efficiency of an advert and to present targeted adverts to you. * Cookie yt.innertube::requests * Duration never * Description YouTube sets this cookie to register a unique ID to store data on what videos from YouTube the user has seen. * Cookie yt.innertube::nextId * Duration never * Description YouTube sets this cookie to register a unique ID to store data on what videos from YouTube the user has seen. Uncategorized Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet. No cookies to display. Reject All Save My Preferences Accept All Powered by Skip to content * Products Menu Toggle * Cloud Platform Menu Toggle * CYMON * CYMON AI * Integrations * Modules Menu Toggle * Brand & IP Intelligence * Situational Intelligence * MITRE Framework Analysis * Threat Intelligence * Supply-Chain Continuous Assessment * Geopolitical Intelligence * Payment & Cyber Fraud Intelligence * Identity Intelligence * Social Media Intelligence (SOCMINT) * Capabilities Menu Toggle * Attack Vectors Menu Toggle * Ransomware * Hidden Services (Dark/Deep Web) * Supply Chain / 3rd Party Risk * Phishing / Social Engineering * State-Sponsored Attacks * Brand & IP Threats * Payment & Cyber Fraud * Social Media & Private Messaging * Industries Menu Toggle * Banking and Finance * Government * Healthcare Industry * Media & Entertainment Industry * Pharmaceutical Industry * Insights Menu Toggle * Downloads * Blog * Case Studies * Why Us * Company * Partners SIGN IN Request a Demo Request a Demo * Products Menu Toggle * Cloud Platform Menu Toggle * CYMON * CYMON AI * Integrations * Modules Menu Toggle * Brand & IP Intelligence * Situational Intelligence * MITRE Framework Analysis * Threat Intelligence * Supply-Chain Continuous Assessment * Geopolitical Intelligence * Payment & Cyber Fraud Intelligence * Identity Intelligence * Social Media Intelligence (SOCMINT) * Capabilities Menu Toggle * Attack Vectors Menu Toggle * Ransomware * Hidden Services (Dark/Deep Web) * Supply Chain / 3rd Party Risk * Phishing / Social Engineering * State-Sponsored Attacks * Brand & IP Threats * Payment & Cyber Fraud * Social Media & Private Messaging * Industries Menu Toggle * Banking and Finance * Government * Healthcare Industry * Media & Entertainment Industry * Pharmaceutical Industry * Insights Menu Toggle * Downloads * Blog * Case Studies * Why Us * Company * Partners Main Menu * Products Menu Toggle * Cloud Platform Menu Toggle * CYMON * CYMON AI * Integrations * Modules Menu Toggle * Brand & IP Intelligence * Situational Intelligence * MITRE Framework Analysis * Threat Intelligence * Supply-Chain Continuous Assessment * Geopolitical Intelligence * Payment & Cyber Fraud Intelligence * Identity Intelligence * Social Media Intelligence (SOCMINT) * Capabilities Menu Toggle * Attack Vectors Menu Toggle * Ransomware * Hidden Services (Dark/Deep Web) * Supply Chain / 3rd Party Risk * Phishing / Social Engineering * State-Sponsored Attacks * Brand & IP Threats * Payment & Cyber Fraud * Social Media & Private Messaging * Industries Menu Toggle * Banking and Finance * Government * Healthcare Industry * Media & Entertainment Industry * Pharmaceutical Industry * Insights Menu Toggle * Downloads * Blog * Case Studies * Why Us * Company * Partners * Products Menu Toggle * Cloud Platform Menu Toggle * CYMON * CYMON AI * Integrations * Modules Menu Toggle * Brand & IP Intelligence * Situational Intelligence * MITRE Framework Analysis * Threat Intelligence * Supply-Chain Continuous Assessment * Geopolitical Intelligence * Payment & Cyber Fraud Intelligence * Identity Intelligence * Social Media Intelligence (SOCMINT) * Capabilities Menu Toggle * Attack Vectors Menu Toggle * Ransomware * Hidden Services (Dark/Deep Web) * Supply Chain / 3rd Party Risk * Phishing / Social Engineering * State-Sponsored Attacks * Brand & IP Threats * Payment & Cyber Fraud * Social Media & Private Messaging * Industries Menu Toggle * Banking and Finance * Government * Healthcare Industry * Media & Entertainment Industry * Pharmaceutical Industry * Insights Menu Toggle * Downloads * Blog * Case Studies * Why Us * Company * Partners SIGN IN Request a Demo Request a Demo * Products Menu Toggle * Cloud Platform Menu Toggle * CYMON * CYMON AI * Integrations * Modules Menu Toggle * Brand & IP Intelligence * Situational Intelligence * MITRE Framework Analysis * Threat Intelligence * Supply-Chain Continuous Assessment * Geopolitical Intelligence * Payment & Cyber Fraud Intelligence * Identity Intelligence * Social Media Intelligence (SOCMINT) * Capabilities Menu Toggle * Attack Vectors Menu Toggle * Ransomware * Hidden Services (Dark/Deep Web) * Supply Chain / 3rd Party Risk * Phishing / Social Engineering * State-Sponsored Attacks * Brand & IP Threats * Payment & Cyber Fraud * Social Media & Private Messaging * Industries Menu Toggle * Banking and Finance * Government * Healthcare Industry * Media & Entertainment Industry * Pharmaceutical Industry * Insights Menu Toggle * Downloads * Blog * Case Studies * Why Us * Company * Partners Main Menu * Products Menu Toggle * Cloud Platform Menu Toggle * CYMON * CYMON AI * Integrations * Modules Menu Toggle * Brand & IP Intelligence * Situational Intelligence * MITRE Framework Analysis * Threat Intelligence * Supply-Chain Continuous Assessment * Geopolitical Intelligence * Payment & Cyber Fraud Intelligence * Identity Intelligence * Social Media Intelligence (SOCMINT) * Capabilities Menu Toggle * Attack Vectors Menu Toggle * Ransomware * Hidden Services (Dark/Deep Web) * Supply Chain / 3rd Party Risk * Phishing / Social Engineering * State-Sponsored Attacks * Brand & IP Threats * Payment & Cyber Fraud * Social Media & Private Messaging * Industries Menu Toggle * Banking and Finance * Government * Healthcare Industry * Media & Entertainment Industry * Pharmaceutical Industry * Insights Menu Toggle * Downloads * Blog * Case Studies * Why Us * Company * Partners White Papers Explore exclusive Cyjax content, providing in-depth insights and expert analysis. Download here Elevate Your Risk Resilience Against Cyber Threats Swiftly Minimise Threat Impact: From Detection to Resolution Discover Our Platform CYMON AI Empowering Your Defence with AI-Powered Threat Intelligence Get Early Access UNVEILING OUR CYBERSECURITY PROWESS MANAGE YOUR EXPANDING ATTACK SURFACE Cover multiple attack vectors and receive insights into supply chain risks to manage a dynamic and growing attack surface. INTEGRATE WITH TIP, SIEM AND SOAR PLATFORMS Scale security measures efficiently and make the most of existent resources by aggregating information under a single pane of glass. SHIFT FROM REACTIVE TO PROACTIVE SECURITY Reduce the need for reactive responses with intelligence that guides security controls adjustments based on external threat insights. View it in action ELEVATE BUSINESS RESILIENCE: PHYSICAL RISK INTELLIGENCE In an era where business resilience goes beyond the digital realm, harnessing the power of threat intelligence for physical risks is paramount. At CYJAX, we understand the intricate connection between physical and digital vulnerabilities, offering you a comprehensive solution to fortify your business against unforeseen challenges. geopolitical intelligence LEADING GLOBAL BRANDS CHOSE CYJAX’S THREAT INTELLIGENCE SOLUTIONS EXPERIENCE INTELLIGENCE TAILORED FOR YOU Our fully customisable platform streamlins operations for unmatched efficiency and proactive security. View CYMON in action RAPIDLY RESOLVE CYBER THREATS, MINIMISING DOWNTIME AND MAXIMISING BUSINESS CONTINUITY 01 BRAND AND IP THREAT INTELLIGENCE Access to real-time, actionable analytical insights that empower you to take proactive measures to safeguard your brand. Protect My Assets 02 PAYMENT AND CYBER FRAUD Enhance fraud detection and maintain regulatory compliance while preserving the trust of your customers. Explore Solutions 03 THIRD-PARTY RISK Boost supply chain resilience, maintain business continuity, and ensure the integrity of your operations with threat intelligence. Secure My Supply Chain REVIEWS CYJAX provided the additional context and filtering we needed to rapidly triage and qualify which alerts need actioning. This freed our team up to make adjustments to our security controls, vastly reducing the number of alerts coming in. CTO | British Energy Provider CYJAX added depth to the broad coverage we already have. We are now able to take quicker and more informed actions as CYJAX is typically 12-36 hours ahead on reportings and key findings. CISO | Global Pharmaceutical company CYJAX enabled us to identify which threats were most relevant, helping our team prioritise threats and increasing the efficiency of our security spending. Head of Threat Intelligence | Financial Service Provider AWARDS AND CERTIFICATIONS LATEST RESEARCH * INITIAL ACCESS BROKERS EXPLAINED View More: Initial Access Brokers Explained * THE CYBERSECURITY AND GEOPOLITICAL DISCUSSION — BROKEN CHINA? — EPISODE 20 View More: The Cybersecurity and Geopolitical Discussion — Broken China? — Episode 20 * STOP RANSOMWARE SPAMMING IN USENET View More: STOP ransomware spamming in Usenet RECEIVE OUR LATEST CYBER INTELLIGENCE INSIGHTS DELIVERED DIRECTLY TO YOUR INBOX Simply complete the form to subscribe to our newsletter, ensuring you stay informed about the latest cyber intelligence insights and news. * I agree to receive other communications from Cyjax. Privacy Policy * info@cyjax.com +44 207 096 0668 Quicklinks * Why Us * Company * Case Studies * Get In Touch Our Products * CYMON * Integrations * Brand & IP Intelligence * Situational Intelligence * MITRE Framework Analysis * Threat Intelligence * Supply-Chain Continuous Assessment * Geopolitical Intelligence * Payment & Cyber Fraud Intelligence * Identity Intelligence * Social Media Intelligence (SOCMINT) Popular Blogs * CYMON AI Sneak Peek * Social Media, Shoplifting and Cybercrime * Russia’s Digital Authoritarianism Tightens the Screw Over Private Sector Data * Cyber Supply Chain Risk Management: Challenges and Best Practices Privacy Policy | Cookie Policy | Terms and Conditions Cyjax Ltd. 2024 Company Registration Number: 08302026 Address: First Floor 1 Des Roches Square, Witan Way, Witney, England, OX28 4BE Scroll to Top