Blueliv
Blog & Resources

Blog

Vawtrak banking Trojan: a threat to the banking ecosystem

Today marks the start of c0c0n International Cyber Security and Policing Conference 2016 where our Labs Research expert, Raashid Bhat, will be sharing insight into the threats posed by the Vawtrak Trojan, one of the most prevalent banking Trojans around today. It promises to be an unmissable session based on Raashid´s recent in-depth technical investigation into the behavior of Vawtrak malware and how it´s executed. c0c0n International Cyber Security and Policing Conference 2016 takes place 19-20 August at The […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Hacking group Shadow Brokers infiltrate NSA Equation Group

Militarization of cyberspace is no longer a novelty. Instances of governments using sophisticated zero-day malware against other nations’ organizations and industry have been seen before now. This week a previously unknown group calling themselves “Shadow Brokers” claimed to have infiltrated a server belonging to Equation Group, a hacking group allegedly linked to the US National Security Agency (NSA). State-sponsored cyberwarfare is complex, difficult to evaluate and the potential impact has many ramifications; one of which is the risk that […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

New Release of Blueliv Threat Exchange Network

Cyber-criminals are very well organised and typically operate as part of highly sophisticated and specialised criminal organizations. Needless to say, in terms of the skills and methods used they are often years ahead of the businesses and establishments they target. In response, companies are increasingly hiring cyber security specialists, purchasing multiple security tools and re-thinking their strategies and approaches to tackle cybercrime. Blueliv two-pronged strategy for tackling cybercrime: Blueliv uses a two-pronged strategy to combat cybercrime. The first approach uses […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Ransomware – How to defend yourself against it

What is Ransomware? Ransomware is a type of malware that has lately been increasingly in use by the cyber criminals. In order to profit from the distribution of Ransomware, the bad guys have been targeting numerous businesses and large organizations around the world. In essence, the Ransomware malware is a piece of malicious software that usually encrypts your files or locks your computer and then requires payment in exchange for returning you the access to your files again. Regrettably, […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Blueliv Becomes the “National Cyber Security Awareness Month 2016” Champion

We are happy to announce that Blueliv is supporting the National Cyber Security Awareness Month (NCSAM) 2016. NCSAM was created as a collaborative effort between government and industry to ensure all digital citizens have the resources needed to stay safer and more secure online while also protecting their personal information. As an official Champion, we (Blueliv) have been recognized for our commitment to cybersecurity, online safety, and privacy. Coordinated and led by the National Cyber Security Alliance (NCSA) and […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Version 3.9 Platform Release feat. NEWS

While you guys have been fine-tuning your cyber defence strategies and finding ways to further improve your overall security postures, we have been busy making improvements to our Threat Intelligence Management Platform. As always, our clients have been really helpful and awesome by providing us with valuable feedback, and communicating their needs and suggestions for improvements. With their help, our great team of dedicated platform developers were able to enhance the user experience, add a number of great new […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Inside Tinba Infection: Stage 2

This is a continuation of the first Tinba post, which is part of a series of posts on how Tinba gradually infects a system. Before we jump into analysis, let’s do a quick recap of the previous actions performed by Tinba and described in the STAGE 1 post: Prepares a second layer payload Rewrites its own header with such payload JMP to the new EntryPoint Decrypt and copy another layer to a new section JMPs to the new section […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Cyber Attacks Targeting SWIFT – Recap

SWIFT stands for Society for Worldwide Interbank Financial Telecommunication, and its purpose is to allow banks and financial institutions in general to communicate securely. It is used in the exchange of information between banks, such as transactions. In this post you will get a short summary of the incidents and a brief description on how these attacks are usually carried-out. In addition, we’ll also provide some Yara rules and IoCs that will allow you and your company to detect […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Blueliv winner of Go Ignite, the scale up program led by four world class telcos

Go Ignite, an alliance between four telecoms, announced last week the five winners selected from its inaugural call for start-ups launched at Mobile World Congress 2016, which attracted over 142 applications from the global start-up community. The winners were selected from the following categories: cyber security, big data analytics, content delivery and customer experience enhancement. We were one of the five winning start-ups and will be provided with business development opportunities by the partners of the Go Ignite alliance […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

MoneyConf 2016: Machine Learning, Big Data and Data Privacy

Blueliv was thrilled to participate for the first time in the latest edition of MoneyConf 2016, based in Madrid. The event offered us the possibility, to attend select panel sessions and participate to roundtables with Top-level financial decision makers and introduce our Cybersecurity solution. We also had the privilege to discuss with the different different financial industry professionals ranging from the most promising Fintech startups to the wealthiest global retail banks. It is no news that the financial system […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone