Join the GroundUp Hackathons: create innovations for Real-World CBRNE Challenges
Malware - short for malicious software - remains one of the most pervasive threats in cyberspace, encompassing various types of malicious code designed to disrupt, damage, or gain unauthorised access to computer systems.
RansomHouse: The Rising Sophistication of Ransomware Toolkits
RansomHouse RaaS now uses multi-layered encryption and double extortion, hitting critical sectors and showing the need for proactive, adaptive cyber defense.
CTI good practices with hyperlinks
Working with CTI means handling risky data safely, use defanging, secure channels, encryption (PGP/E2EE), OPSEC, proper file handling and sandboxing.
Malware-as-a-Service (MaaS): a new business model
MaaS turns cybercrime into a paid service, letting even low-skill actors launch sophisticated attacks at scale, driving over half of recent malware threats worldwide.
In the labyrinth of cybercrime money laundering
The laundering of money from cybercrime involves a complex network of transfers, and investigators tracking these funds navigate a maze of cryptocurrency transactions and conversions.
Online data thieves: how the cybercrime bazaar works
Cybercrime has evolved into a complex business ecosystem, where malicious tools and stolen data are sold like services. The lone hacker myth is gone, CaaS now fuels today’s digital crime.
The Role of Blockchain Analytics in the Fight Against Crime-as-a-Service
Blockchain poses challenges for law enforcement, offering both anonymity for criminals and full transparency through permanent transaction records. With blockchain analytics, investigators can trace fund flows, link related wallets, and track movements across chains, revealing criminal networks and identifying touchpoints with the traditional financial system.
How Ransomware Actors Leverage Cryptocurrency: A Real-World Use Case
Ransomware is among today’s most disruptive cyber threats, with cryptocurrency payments enabling attackers to operate globally, quickly, and with relative anonymity.
The Evolving Phishing Threat: Why Traditional MFA is Failing
Phishing kits like Tycoon 2FA bypass traditional MFA at scale, exposing a shift toward Phishing-as-a-Service and the need for stronger authentication.
The Innovation Gap: How Cybercriminals Exploit Emerging Tech Before Law Enforcement Can Respond
Cybercriminals adopt new tech faster than regulators. Closing the gap means investing in expertise, AI, and global public–private collaboration.


