An interactive map that shows how each cybercriminal underground scene in each region differ from another: from accessibility, to identity, and product service offerings.
Major security certification provider has been spreading TeslaCrypt, a ransomware that takes the victim’s files hostage via encryption. More details here.
This research paper provides a closer look into China’s bustling cybercriminal underground—including new market offerings like leaked data search engines and carding devices.
The security threat landscape was filled with a lot of big, notable incidents this year, but that doesn't mean we can't be thankful for other developments this Thanksgiving. Here are five things we're grateful for this year.