A look into the North American underground reveals a more "open" community that encourages cybercriminal activity with easily accessible sites and convenient marketplaces.
This research paper provides a closer look into China’s bustling cybercriminal underground—including new market offerings like leaked data search engines and carding devices.
This research paper offers a glimpse into Japan's unique cybercriminal underground—it's economy, the cybercriminals' activities, and a marketplace characterized by the taboo, the illegal, and the vindictive.
A decade's worth of breaches has led to this. Forward-looking threat researcher Numaan Huq analyzes what has happened to the stolen data affecting major US industries. We map out the probabilities; see where the information goes and how much it's sold.
Details from the TorrentLocker infections seen in the first half of 2015, including common evasion techniques and solutions that can be used to defend against the threat.
This latest paper details the latest activities of Rocket Kitten, a threat actor group involved in Operation Woolen-Goldfish last March, and how they've been found to be attacking multiple targets in the Middle East.
In the US and other locations worldwide, gas stations are primarily privately owned. While most of them have been modernized, there are still a lot of risks tied to their business, especially those that are connected to the Internet.
Today, the Russian underground has predictably matured with a growing number of illicit products and services and an improved infrastructure. See how this thriving underground market has evolved.
This live casino online research paper offers a look into an important—yet often overlooked—component used by major cybercrime operations: Bulletproof Hosting Services.