Blueliv
Blog & Resources

Blog

Business threat intelligence | Win the fight against phishing attacks

Blueliv has one module that handles two of the main cyber threats targeted at businesses–Phishing and Cybersquatting. This module plugs into our threat monitoring Enterprise Platform Solution. For completeness, we’ll divide these threats into separate articles. First, it’s important to understand the inherent nature of these attacks. Criminals who steal are not all the same. There’s a clear distinction between a thief and a robber. A robber takes something from you by force. In the cyber world, that’s the […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Blueliv at Infosecurity Europe 2017

This year, we had the opportunity to exhibit in this year’s edition of Infosecurity Europe (Infosec) in London, Europe’s largest and most comprehensive Information Security event, which welcomed more than 13,500 visitors including industry’s thought leaders and experts.   Threat Intelligence high in the Agenda The 22nd edition took place from the 6-8th June and it was a great success. Blueliv was at the stand T52. Our stand received a lot of visitors, both existing and potential customers and […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Blueliv Threat Exchange Network | A community of early cyber responders

Cybercrime has become a socialized industry, and as such criminals employ community knowledge and resources found on the dark web and deep web to intensify efforts. In 2016, Europol identified some startling trends that demonstrate how sophisticated cyber criminals have become. Here are some top specialties and readily available tools of the trade: Crime-as-a-Service – specialist providers of digital tools and services Ransomware Surge – continues to be a top malware threat Criminal Data Use – gathering and use […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Necurs, one of the world’s biggest botnets today

The Necurs botnet is one of the biggest active botnets today. It affects mainly Asian and European countries, but, with more than 1.5 million infected computers, it also has some active bots in almost all continents and countries. This big botnet is actually formed by 7 smaller botnets put together using the same malware. Necurs is a modular malware with a lot of features, but it is mainly known for sending large spam campaigns through email. Necurs is mainly a Loader/ Dropper able to download […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Cyber Threat Intelligence Feeds | Secure your network before an attack

Which malicious malware attack does your boss need you to block today? Blueliv Cyber Threat Intelligence Feeds provide security information that’s granular, industry specific and on time. Experts from respected think tanks like Gartner and RSA agree. Knowledge-based information and targeted action are having a profoundly positive effect on enterprise security. Threat Intelligence Data Feed uncovers traces left by cyber criminals and pinpoints the source. Big data exposes criminal motives and modus operandi. It provides specific real-time threat particulars […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

What our honeypots taught us about Wannacry ransomware

WannaCry has been on the lips, and especially in the concerns of everyone these last days. As we have addressed in recent posts, Friday, 12th May, marked the beginning of a massive global campaign to spread the WannaCry ransomware (a.k.a. WCry, WannaCrypt, WCrypt, WannaCrypt0r…). The ransomware spreads through a worm that uses the recently leaked ETERNALBLUE exploit, which takes advantage of a SMBv1 vulnerability. Despite the availability of Microsoft’s security update released in mid-March, businesses largely failed to update […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

WannaCrypt Malware Analysis

Last Friday, 12th May, a worm targeting outdated Windows machines was detected. The worm in question used leaked NSA exploits to propagate and dropped a variant of a ransomware called WannaCrypt. This post will try to give you an insight into the infection process, as well as the spreading of the worm and some details about the cryptography. Furthermore, at the bottom, you will find YARA rules to detect this sample.   Infection vector The worm spreads by using […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Wannacry Ransomware used to spread global cyber attacks

A global ransomware attack began impacting companies and hospitals across the United States, Europe, and Asia early Friday morning. Companies in more than 70 countries have reported incidents as of Friday afternoon. Computers all over the world are being locked down by a ransomware called Wannacry/Wanna/Wcry. The British government has announced that a bitcoin virus attack has hit public hospitals in the country on a large scale, requiring users of the network to pay $300 in exchange for access […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

El ransomware ataca contundentemente el IBEX-35

Este viernes ha saltado la noticia de que el ransomware “WannaCry” se ha colado en los sistemas informáticos de algunas de las empresas del IBEX-35 aprovechando una vulnerabilidad de los sistemas Windows. El Gobierno británico por su parte, ha anunciado que un ataque mediante virus bitcoin ha afectado a gran escala a los grandes hospitales públicos del país, exigiendo a los usuarios de la red el pago de 300$ a cambio de acceso al ordenador. El ransomware es un […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

The real cost of credit card theft and how to protect your assets

Sometime in mid-February 2017, anti-fraud teams from multiple financial institutions contacted KrebsOnSecurity for help tracing the source of a credit card fraud happening in high-end restaurants around the U.S. Investigations revealed a vast majority of patrons with compromised cards dined in locations run by Select Restaurants, Inc., a management group out of Cleveland, OH. Further digging also uncovered a tie-in with an earlier breach discovered in July 2016 that occurred in another national restaurant chain in the U.S.–CiCi’s Pizza. […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone