Skip to content
Logo

Cyber Crime Research Share

CONTACT
CONTACT
  • CCRS
  • About
    • CCRS Fellowship
    • CCRS Friends
  • Topics
    • Cybercrime
    • Digital Investigation
    • Digital Forensics
    • Digital Evidence
    • Digital Surveillance
    • Digital Privacy
    • Cyber Security
  • Up2Date
    • KnowHow
    • NetWork
    • Events
    • People of Interest
    • Projects of Interest
    • Periodicals of Interest
  • CCRS Bit
  • CCRS Byte
  • SERBIA
    • RS Cybercrime
    • RS Digital Surveillance
    • RS Cyber Security
    • Report!
  • SR
  • CCRS
  • About
    • CCRS Fellowship
    • CCRS Friends
  • Topics
    • Cybercrime
    • Digital Investigation
    • Digital Forensics
    • Digital Evidence
    • Digital Surveillance
    • Digital Privacy
    • Cyber Security
  • Up2Date
    • KnowHow
    • NetWork
    • Events
    • People of Interest
    • Projects of Interest
    • Periodicals of Interest
  • CCRS Bit
  • CCRS Byte
  • SERBIA
    • RS Cybercrime
    • RS Digital Surveillance
    • RS Cyber Security
    • Report!
  • SR

Periodicals of Interest

  • Know
  • Connect
  • Share

Journals, proceedings, magazines, news aggregators, blogs, podcasts, etc.

Information available on links

Content

Cybercrime >>

Digital Forensics >>

Digital Surveillance and Digital Privacy >>

Cyber Security >>

Cybercrime

Časopisi i zbornici

IJCIC >

International Journal of Cybersecurity Intelligence and Cybercrime

IJISC >

International Journal of Information Security and Cybercrime

P&I >

Policy and Internet

IJCC >

International Journal of Cyber Criminology

BJCC >

British Journal of Cyber Criminology

CBSN >

Cyberpsychology, Behavior, and Social Networking

CLSC >

Crime, Law and Social Change

JIW >

Journal of Information Warfare

CS >

Crime Science Journal

IJCWT

International Journal of Cyber Warfare and Terrorism

RIDP >

Revue Internationale de Droit Pénal

ICJR >

International Criminal Justice Review

EJCPR >

European Journal on Criminal Policy and Research

Eucrim >

Max Planck Institute’s publication

ECCL >

European Journal of Crime, Criminal Law and Criminal Justice

NJECL >

New Journal of European Criminal Law

CyberCon Proceedings >

Proceedings of the International Conference on Cybersecurity and Cybercrime

ICCWS Proceedings

The International Conference on Information Warfare and Security Proceedings

Cyber Monitor >

Eurojust publication 

IOCTA >

Internet Organised Crime Threat Assessment,  EC3

Vesti

CyberDigest >

CoE‘s bi-weekly selection of news

Cybercrime@CoE Update >

CoE‘s quarterly review 

Cybercrime Magazine >

Magazine

The Record >

News 

Infosecurity Magazine >

News

The Hacker News >

News

Bleeping Computer >

News

Hackread >

News

GBHackers >

News

Cyber Security News >

News

Blogovi, podkasti, YT kanali itd.

Hacker arise >

Blog

Cybercrime diaries >

Blog

Cybercrimeology >

Podcast

The Hacker Mind >

Podcast

Cyber Crime Junkies >

Podcast

Cybercrime Radio >

Cybercrime Magazine Podcast

Darknet Diaries >

Podcast

Malicious Life >

Podcast by Cybereason

What the Hack with Adam Levin >

Podcast

Computer Crime Chronicles >

Podcast

Security Now >

Podcast

Hacking Humans >

Podcast

Smashing Security >

Podcast

Cyberside Chats >

Podcast

The Lazarus Heist >

Podcast

Hack me if you can >

Podcast

Dr Dark Web >

Podcast

The Hacker Factory >

Podcast

Realhackhistory >

YT channel

DEF CON 31 War Stories >

YT channel

Digital Forensics

Časopisi i zbornici

DI >

Digital Investigation: International Journal of Digital Forensics & Incident Response

IEEE TIFC >

Institute of Electrical and Electronics Engineers, Transactions on Information Forensics and Security Journal

IJDCF >

International Journal of Digital Crime and Forensics

CFATI >

International Journal of Cyber Forensics and Advanced Threat Investigations

CFS >

Journal of Computer and Forensic Sciences

DEESLR >

Digital Evidence and Electronic Signature Law Review

IJESDF >

International Journal of Electronic Security and Digital Forensics

JDFSL >

Journal of Digital Forensics, Security and Law

IJoFCS >

International Journal of Forensic Computer Science

IJCSDF >

International Journal of Cyber-Security and Digital Forensics

JDF >

Journal on Digital Forensics & Cyber Security

FSI >

Forensic Science International Journal

CSDF >

Journal of Cyber Security and Digital Forensics

DigiSecForensics >

Journal of Digital Security and Forensics

JFC >

Journal of Forensic Sciences

Advances in Digital Forensics >

Annual IFIP WG 11.9 International Conference Proceedings

ADFSL Proceedings >

Association of Digital Forensics, Security and Law, Conference on Digital Forensics, Security and Law Proceedings

DFRWS Proceedings >

Digital Forensic Research Workshop, papers & presentations

ISDFS Proceedings >

International Symposium on Digital Forensic and Security

Vesti

DF Mag >

Digital Forensics Magazine 

e-Forensics >

Magazine

SANS DFIR >

News

Forensics Focus >

News

this week in 4n6 >

News

DFIR Training >

News

Blogovi, podkasti, YT kanali itd.

About DFIR >

Blog

Digital Detective >

Blog

The DFIR Report >

Blog

dfir.blog >

Blog

DFIR Review >

Blog

Forensic Focus >

Blog

Craig Silverman >

Blog

Andrea Fortuna >

Blog

Brett's Ramblings >

Blog

The Binary Hick >

Blog

Hacking exposed >

Blog

Data Expert >

Blog

Bellingcat >

Blog

Intelligence Hub >

Blog

Belkasoft >

Blog

Cellebrite >

Blog

Magnet Forensics >

Blog

Oxygen Forensics >

Blog

Compelson >

Blog

Cyacomb >

Blog

The DFIR Report >

Podcast

DF Now >

Podcast

DF Survival >

Podcast

DF Redefined >

Podcast

Forensic Focus >

Podcast

Digital Surveillance and Digital Privacy

Časopisi i zbornici

IRLCT >

International Review of Law, Computers and Technology

CLSR >

Computer Law and Security Review

STLR >

Science and Technology Law Review

DLR >

Digital Law Review

JHTL >

Journal of High Technology Law

JTLP >

Journal of Technology Law & Policy

IJDS >

International Journal for Digital Society

DS >

Digital Society Journal

DTS >

Digital Transformation and Society Journal

ICTL >

Information and Communications Technology Law

IPR >

Internet policy review

CIL >

Computer and Internet Lawyer

SHR >

Security and Human Rights Journal

SILT >

Studies in Ethics, Law and Technology

RJLT >

Richmond Journal of Law & Technology

HLP >

Harvard Law & Policy Review 

RCTLJ >

Rutgers Computer and Technology Law Journal

JLT >

Harvard Journal of Law & Technology

STLR >

Columbia Science and Technology Law Review

NJTIP >

Northwestern Journal of Technology and Intellectual Property

JSSS >

Journal of Surveillance, Security and Safety

AI&Law >

Artificial Intelligence and Law Journal

EDPLR >

European Data Protection Law Review

IDPL >

International Data Privacy Law Journal

SS >

Surveillance and Society Journal

Vesti

404 Media >

News

Wired >

News

Ars Technica >

News

The Record >

News

DataBreaches>

News

Biometrics Update >

News

Privacy International >

News

The Citizen Lab >

News

ERDi-gram>

News

EPIC >

News

ACLU >

News

Digital Conflicts >

Magazine 

First Monday >

Magazine 

Cybercsoop >

Magazine 

The Intercept >

Magazine 

Blogovi, podkasti, YT kanali itd.

Future of Privacy Forum >

Blog

about:intel >

Blog

PIS Law Blog >

Blog

Privacy Paradox >

Lawfare Blog

Inside Privacy >

Blog

DPO Blog >

Data Protection Officer Blog

Decipher >

Blog

GDPR Buzz Blog >

Blog

Access Now >

Blog

Deeplinks >

Blog by EFF

Data Counsel >

Blog

The Cyberlaw Podcast >

Podcast

CYBER >

Podcast

EFFector >

Podcast

Shoot the Messenger >

Podcast

UnderSurveillance >

Podcast

Click here >

Podcast

Caveat >

Podcast

Surveillance Report >

Podcast

Opt Out >

Podcast

Cyber Security

Časopisi i zbornici

CS >

Computers & Security Journal

JCS >

Journal of Computer Security

CSA >

Cyber Security and Applications Journal

JSC >

Journal of Cybersecurity

Cybersecurity >

Journal

IET ISJ >

Institution of Engineering and Technology, Information Security Journal

IET IC >

Institution of Engineering and Technology, Information Security Journal

EURASIP JIS >

European Association for Signal Processing, Information Security Journal

JCST >

Journal of Cyber Security Technology

JCP >

Journal of Cybersecurity and Privacy

IEEE TDSC >

Institute of Electrical and Electronics Engineers,  Transactions on Dependable and Secure Computing Journal

IEEE SPJ >

Institute of Electrical and Electronics Engineers, Security & Privacy Journal

ACM TCS >

Association for Computing Machinery, Transactions on Computer Systems Journal

ACM TPS >

Association for Computing Machinery,  Transactions on Privacy and Security Journal

JCVHT >

Journal of Computer Virology and Hacking Techniques

IJISP

International journal of information security and privacy

IJCIC >

International Journal of Cybersecurity Intelligence and Cybercrime

IJIS >

International Journal of Information Security

ISC >

Information Security Journal: A Global Perspective

Cryptography

Journal

Journal of Cryptology

Journal

Cryptologia >

Journal

JISA >

Journal of Information Security and Applications

EJPS >

European Journal of Policing Studies

EJSR >

European Journal for Security Research

HNSJ >

Harvard National Security Journal

IFIP AICT >

Institution of Engineering and Technology, Advances in Information and Communication Technology series

EICC >

European Interdisciplinary Cybersecurity Conference

IEEE SP >

IEEE Symposium on Security and Privacy Proceedings

IEEE EuroS&P >

IEEE European Symposium on Security and Privacy Proceedings

IEEE CSF >

Institute of Electrical and Electronics Engineer, Computer Security Foundations Symposium Proceedings

IEEE INFOCOM >

Institute of Electrical and Electronics Engineer, International Conference on Computer Communications Proceedings

IEEE DSC >

Institute of Electrical and Electronics Engineer, International Conference on Data Science in Cyberspace Proceedings

ACM CHI >

Association for Computing Machinery, Conference on Human Factors in Computing Systems Proceedings

ACM CCS >

Association for Computing Machinery, Conference on Computer and Communications Security Proceedings

Blogovi, podkasti, YT kanali itd.

SCN >

Security and Communications Networks Journal

Black Hat >

Conference talk archives, YT channel

Threat Post >

Magazine

CS Magazine >

Magazine

Cyber Defense Magazine >

Magazine

Cyber Security Magazine >

Magazine

Hakin9 Magazine >

Magazine 

Infosecurity Magazine >

Magazine 

Computer Weekly >

Magazine 

TechCrunch >

Magazine 

Techdirt >

Magazine 

CNET >

Magazine 

ZDNET >

Magazine 

CyberScoop >

News

The Hacker News >

News

Bleeping Computer >

News

Hackread >

News

GBHackers >

News

Cyber Security News >

News

The Record >

News

CSOC >

News

Bad Sector Labs >

News

Infosecurity Magazine >

News

Security Week >

News

Malware.News >

News

Darkweb Informer >

News

Daily Dark Web >

News

CSO online >

News

Virus Bulletin >

Portal

FalconFeeds.io >

Portal

Meta’s threat disruptions >

Blog

Google’s Threat Analysis Group (TAG) >

Blog

Microsoft Security Blog >

Blog

Seqoia >

Blog

Mandiant >

Blog

Group - IB >

Blog

Cisco Blogs>

Blog

Kaspersky Blog >

Blog

Palo Alto Networks Blog >

Blog

Unit 42 >

Blog

The Akamai >

Blog

Analyst1 >

Blog

Bitdefender >

Blog

SOCradar >

Blog

Malwarebytes Lab >

Blog

Symantec >

Blog

Eclecticiq >

Blog

Morphisec >

Blog

One Jailbreak >

Blog

@NakedSecurity >

Blog

MS Security Insider >

Blog

ImmuniWeb Security Blog >

Blog

IT Guru >

Blog

Dark Reading >

Blog

Dragon News Blog >

Team Cymru’s Blog

Proof Point Blog >

Blog

Hack the Box >

Blog

The H4unt3d Hacker >

Podcast

What the Shell? >

Podcast

The Shared Security Show >

Podcast

Breaking Down Security >

Podcast

BarCode >

Podcast

Dr Dark Web >

Podcast

Risky Business >

Podcast

Life of a CISO >

Podcast

8th Layer Insights >

Podcast

401 Access Denied >

Podcast

Adventures of Alice and Bob >

Podcast

Open Source Security >

Podcast

Cloud Security Podcast >

Podcast by Google,  hosted by  @anton_chuvakin and @_TimPeacock

Security Intelligence >

Podcast

TrustedSec >

Podcast

Beers with Talos >

Podcast 

The Hacker Factory >

Podcast

Phillip Wylie Show >

Podcast

DISCARDED >

Tales from the Threat Research Trenches, Podcast

Critical Thinking >

Bug Bounty Podcast

Bug Bounty Reports Explained

Podcast

CyberWire Daily >

Podcast

Cloak & Dagger >

Podcast

ITSP Magazine >

Podcast Network

Hive Five >

Newsletter

tl;dr sec >

Newsletter

Unsupervised Learning Community >

Newsletter

Vulnerable U

Newsletter

Bugcrowd >

Platform

The Inside Man >

KnowBe4 Series

CyberCrime.Research.Share
  • CCRS
  • About
  • Topics
  • Up2Date
  • CCRS Bit
  • CCRS Byte
  • SERBIA
  • SR

Privacy Policy

Be informed

CCRS Bit

CCRS Byte

 

Keep-in-touch

contact@cybercrime.rs

Stay tuned

Follow CCRS

Copyright ©

Made by CCRS with ♥

⚠️  Disclaimer:

Provided for educational and informative purposes only