An interactive map that shows how each cybercriminal underground scene in each region differ from another: from accessibility, to identity, and product service offerings.
Major security certification provider has been spreading TeslaCrypt, a ransomware that takes the victim’s files hostage via encryption. More details here.
This research paper provides a closer look into China’s bustling cybercriminal underground—including new market offerings like leaked data search engines and carding devices.