Research on the common technologies used by cybercriminals and terrorists to benefit their cause, from the services they abuse to the tools they’ve homebrewed to streamline activities.
An interactive map that shows how each cybercriminal underground scene in each region differ from another: from accessibility, to identity, and product service offerings.
Major security certification provider has been spreading TeslaCrypt, a ransomware that takes the victim’s files hostage via encryption. More details here.