There is a new section on http://moneroleaks.xyz
It's called "List of attacks"
Learn the names and inner workings of 6 common techniques used to trace monero, as well as information about real-world cases where each technique was used to trace and convict a monero user