Blog

The Blueliv blog is home to the latest threat intelligence analysis, content from investigations, corporate news, information about our modular cyberthreat intelligence solutions, and more. Take some time to explore the archives and perspectives from our intelligence analysts and management team.

North American credential theft industry records substantial quarterly increase, against declines in Europe and Asia

on

October 10, 2018

141% increase in compromised credentials detected in North America during Blueliv quarterly analysis Fewer compromised European and Asian credentials detected over same period (22% and 36% decreases respectively) LokiPWS...

corporate-blueliv
Blueliv shortlisted for four of Computing’s Security Excellence Awards

on

October 10, 2018

Following our recent recognition as Threat Intelligence Company of the Year 2018 by Cybersecurity Breakthrough, we are pleased to announce that we have been named Finalists in the following...

research-blog
ARS Loader evolution, a new stealer (ZeroEvil) and AirNaine (TA545)

on

October 5, 2018

This blog post details the research performed by the Blueliv Labs team and presented by Jose Miguel Esparza at Virus Bulletin in Montreal. The research is related to ARS...

industry-blog
Threat Exchange Network blog: September 2018

on

September 26, 2018

The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and...

Blueliv named ‘Threat Intelligence Company of the Year’ in Cybersecurity Breakthrough Awards 2018

on

September 26, 2018

We’re delighted to announced that today we have been named ‘Threat Intelligence Company of the Year 2018’ in the Cybersecurity Breakthrough Awards. Our innovations in cyber-risk management and the...

The right tools for the job: how to protect against credential theft

on

August 28, 2018

Humans are often described as the weakest link in the cybersecurity chain. This is certainly true to an extent: witness the fact that phishing enabled 93% of data breaches...

Credentials
Why Proactive Cybersecurity Begins with Monitoring for Compromised Credentials

on

August 28, 2018

Most IT security teams today are under a huge amount of pressure. With dwindling human resources, they must tackle a growing volume and range of sophisticated threats, as well...

Detecting Compromised Credentials

on

August 27, 2018

Why Proactive Cybersecurity Begins with Monitoring for Compromised Credentials Most IT security teams today are under a huge amount of pressure. With dwindling human resources, they must tackle a...

insurance credential theft
Insurance Identity theft: The weakest link

on

August 27, 2018

Anyone following the cybercrime landscape over the past two decades will be aware of one inalienable truth: online criminals will always go where there are people and money. Unfortunately,...

Banking on Threat Intelligence: The Impact of Credential Theft on Financial Services

on

August 27, 2018

A couple of years ago cyber-thieves managed to compromise the accounts of thousands of Tesco Bank customers in the UK, stealing £2.5m in the process. The attack was labelled...

Stopping Password Theft: The Value of Proactive Threat Intelligence

on

August 27, 2018

Password Theft and passwords represent the “keys to the kingdom” in our modern, digital-centric world. They protect our personal and corporate email, our social networking accounts, and access to...

Identity theft: mitigating risk for the enterprise

on

August 20, 2018

Today’s CIOs and CISOs have a problem. On the one hand they’re under increasing pressure to support digital transformation efforts designed to drive business growth and agility. But in...

Threat Exchange Network blog: July 2018

on

August 1, 2018

The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in...

Credential theft: the business impact of stolen credentials

on

July 23, 2018

Cybercriminals are stealing credentials using a wide range of techniques, tactics and procedures. The compromised data has a variety of uses and enables attackers to breach organizations and steal...

European credential theft industry booming as US market sees decline

on

June 13, 2018

39% increase in compromised credentials detected in Europe and Russia in 2018 Europe-only credential theft success at 62% growth rate Europe and Russia home to half of credential theft...

Threat Exchange Network blog: June 2018

on

July 2, 2018

The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in...

Combatting password re-use

on

May 9, 2018

A recent article on The Register discussed an academic paper proposing that high-profile websites cooperate to stop users re-using passwords. If sites like Twitter and Facebook share users’ credentials,...

industry-blog
Threat Exchange Network blog: April 2018

on

May 3, 2018

The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and...

Introducing Threat Context: our newest deep defense tool for richer investigations

on

May 17, 2018

Today we release a brand new module to help cybersecurity teams improve their productivity. Threat Context provides contextualized, qualified threat indicator information, enhancing incident triage, post-incident forensics and red...

Blueliv RSA 2018
Recap: Blueliv at RSA Conference 2018

on

April 25, 2018

Last week, RSA Conference 2018 pulled 45,000 attendees from all over the world to San Francisco’s Moscone Centre. The week was packed with keynotes from tech luminaries, networking events...

research-blog
Drupalgeddon2 (SA-CORE-2018-002 / CVE-2018-7600) – an analysis of payloads observed in the wild 

on

April 18, 2018

A few weeks ago a highly critical Drupal vulnerability dubbed as Drupalgeddon2 (SA-CORE-2018-002 / CVE-2018-7600) was discovered and patched by Drupal developers. This security problem permits remote code execution...

industry-blog
Threat Exchange Network blog: March 2018

on

March 27, 2018

The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and...

industry-blog
Blueliv Annual Cyberthreat Report advises increased intelligence sharing and cross-industry collaboration

on

March 7, 2018

Malware advances no longer focused on ‘traditional’ enterprise targets as cybercriminals expand their scope Today we release our Annual Cyberthreat Report, compiling actionable intelligence from Threat Compass with expert...

industry-blog
Threat Exchange Network blog: February 2018

on

March 1, 2018

The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and...

corporate-blueliv
Blueliv secures €4 million Series A funding, strengthens leadership team to accelerate global expansion

on

February 14, 2018

Vento’s investment boost accompanied by senior hire and growth into new Barcelona headquarters 14 February 2018 – Barcelona, Spain – Blueliv, Europe’s leading provider of enterprise-class cyberthreat intelligence solutions,...

industry-blog
Threat Exchange Network blog: January 2018

on

February 1, 2018

The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and...

corporate-blueliv
Blueliv Partner Program opens up our modular cyberthreat intelligence tools to the channel

on

January 18, 2018

Multi-market Strategic Partnership Program is designed to drive higher margins and accelerate partner revenue and growth Today we launch our Strategic Partnership Program, featuring deal registration incentives, dedicated sales...

GDPR-Accelerate-your-reaction-time
GDPR: Accelerate your reaction time, reduce your penalty

on

November 13, 2017

New whitepaper shows how threat intelligence can help mitigate the impact of GDPR on your business The new European Union General Data Protection Regulation (GDPR) is coming into force...

artificial-intelligence
Research from Blueliv honored at Artificial Intelligence & Machine Learning conference

on

November 3, 2017

Blueliv recently participated in the 20th International Conference of the Catalan Association for Artificial Intelligence (Congrés Català en Intel·ligència Artificial or CCIA), whose objective is to foster discussion among...

research-blog
Making the headlines: Bad Rabbit and Reaper malware

on

October 27, 2017

Though we process thousands of malware samples per day, very few of them attract the attention of the mainstream media in the way that Bad Rabbit and Reaper have...

research-blog
TrickBot banking trojan using EFLAGS as an anti-hook technique

on

October 6, 2017

In one of our analysis of the TrickBot banking trojan, we found an interesting anti-sandbox that catches (almost) all user-mode (ring3) sandboxes, and we would like to share it...

sonic-drive-in-credit-card-theft-detection-use-case
Sonic Drive-In | Credit Card Theft Detection Use Case

on

October 5, 2017

Photo courtesy Sonic Franchises On September 26, 2017, Sonic the U.S. fast-food chain based in Oklahoma City, OK, with about 3,600 locations across 45 states, acknowledged that their...

Avoid-being-the-next-Equifax
Data Breach | Avoid being the next Equifax

on

September 19, 2017

Image Courtesy CNN Money On 29 July 2017, Equifax, one of the big-three credit reporting companies, announced the discovery of a data breach exposing an estimated 143M Americans. Unauthorized...

security-posture
4 Strategies to bolster your 2017 security posture

on

September 1, 2017

Is your business prepared for a cyber threat? Here are some considerations to help you understand the important dynamics of your security posture strategies: End users are the number...

avoid-toxic-rogue-mobile-apps
Threat intelligence to help you avoid toxic rogue mobile apps

on

August 23, 2017

Image Courtesy BBC News How did my dad’s Uber account get hacked? Sometime around July 6, 2017, ABC News Brisbane reporter Josh Bavas, received 2 a.m. notification that someone...

brand-abuse
10 things you need to know about brand abuse and how to stay alerted to them

on

August 11, 2017

Brand abuse is a big problem, and it’s getting bigger. Between 2010-2014, the EU, US, and Japanese customs authorities seized and estimated €467.5M EU / $953.2M US / ¥100M...

Man-in-the-browser
How banks can protect customers from “Man in the browser attacks”

on

August 4, 2017

Criminal groups use a wide range of methods to compromise users and siphon its bank accounts, for this reason, when a user’s computer is infected by a malware, depending...

Targeted-malware-detection
Targeted Malware Detection

on

July 27, 2017

Today’s cyber criminal wants one thing. He wants to get his malware into your IT network because once he’s in, he can go to work–remotely–achieving the myriad of other...

leaked-data
Avoid the cost and headache of leaked data (here’s how)

on

July 20, 2017

“Leaked data falls into 4 types,” says Peter Gordon from SANS Institute: confidential information, intellectual property, customer data and health records. Data leakage, however, is not limited to deliberate...

CISO-360-Congress
Successful CISO 360 Congress sponsored by Blueliv

on

July 10, 2017

Last week, Pulse Conferences hosted the CISO 360 Congress at the Grand Marina hotel in Barcelona; an incomparable frame by the Mediterranean Sea where more than 80 CISOs gathered...

colors-of-cybersquatting
The many colors of cybersquatting – Do not underestimate them

on

July 7, 2017

Blueliv Guest Post | Jean-Jacques Dahan, Managing Director and Expert Consultant for Online Brand Security & Global Domain Strategy at Zeusmark. Cybersquatting is a constant challenge for a company. It is...

ruthless-cybersquatters
Protect your business against ruthless cybersquatters

on

July 6, 2017

Also this week: Blueliv is pleased to announce a featured post on the subject of Cybersquatting from Jean-Jacques Dahan–Managing Director and Expert Consultant for Online Brand Security & Global...

Petya-ransomware-2
Petya Ransomware cyber attack is spreading across the globe – Part 2

on

June 29, 2017

Following our first blog providing an early analysis about Petya, we are sharing further findings of the malware analysis that we have performed. We divided this post into the...

Petya-ransomware-1
Petya Ransomware cyber attack is spreading across the globe – Part 1

on

June 27, 2017

As you might know, Petya Ransomware is currently devastating Airlines, Banks & Utilities and many other businesses across the globe. Denmark, France, Spain, Ukraine, and the USA are already...

phishing
Business threat intelligence | Win the fight against phishing attacks

on

June 21, 2017

Blueliv has one module that handles two of the main cyber threats targeted at businesses–Phishing and Cybersquatting. This module plugs into our threat monitoring Enterprise Platform Solution. For completeness,...

Infosec
Blueliv at Infosecurity Europe 2017

on

June 14, 2017

This year, we had the opportunity to exhibit in this year’s edition of Infosecurity Europe (Infosec) in London, Europe’s largest and most comprehensive Information Security event, which welcomed more...

threat-exchange
Blueliv Threat Exchange Network | A community of early cyber responders

on

June 13, 2017

Cybercrime has become a socialized industry, and as such criminals employ community knowledge and resources found on the dark web and deep web to intensify efforts. In 2016, Europol...

MRTI-Feed
Cyber Threat Intelligence Feeds | Secure your network before an attack

on

May 24, 2017

Which malicious malware attack does your boss need you to block today? Blueliv Cyber Threat Intelligence Feeds provide security information that’s granular, industry specific and on time. Experts from...

honeypots-wannacry
What our honeypots taught us about Wannacry ransomware

on

May 23, 2017

WannaCry has been on the lips, and especially in the concerns of everyone these last days. As we have addressed in recent posts, Friday, 12th May, marked the beginning...

wannacrypt-analysis2
WannaCrypt Malware Analysis

on

May 15, 2017

Last Friday, 12th May, a worm targeting outdated Windows machines was detected. The worm in question used leaked NSA exploits to propagate and dropped a variant of a ransomware...

wannacry
Wannacry Ransomware used to spread global cyber attacks

on

May 12, 2017

A global ransomware attack began impacting companies and hospitals across the United States, Europe, and Asia early Friday morning. Companies in more than 70 countries have reported incidents as...

wannacry2
El ransomware ataca contundentemente el IBEX-35

on

May 12, 2017

Este viernes ha saltado la noticia de que el ransomware “WannaCry” se ha colado en los sistemas informáticos de algunas de las empresas del IBEX-35 aprovechando una vulnerabilidad de...

credit-card-theft1
The real cost of credit card theft and how to protect your assets

on

May 11, 2017

Sometime in mid-February 2017, anti-fraud teams from multiple financial institutions contacted KrebsOnSecurity for help tracing the source of a credit card fraud happening in high-end restaurants around the U.S....

botnets
Peeling back the layers surrounding zombie computer botnets

on

May 3, 2017

What is a Botnet? To understand a botnet, you first must begin with a bot. A bot is an automated malware program or roBOT that takes control of a...

corporate-blueliv
Blueliv en Securmática: La ciberseguridad aterriza en la alta dirección

on

April 20, 2017

Una vez más, Blueliv participará y patrocinará el congreso global de ciberseguridad, seguridad de la información y privacidad, Securmática. El congreso se llevará a cabo del 25 al 27...

Deep-dive-into-the-dark-web
Deep dive into the Dark Web

on

April 11, 2017

What is the Dark Web? The Dark Web a part of the World Wide Web made up of a variety of anonymous networks, untraceable online activity and non-referenced URLs...

315-platform-release
Platform Release 3.15: detect cybersquatting threats faster

on

April 6, 2017

Our latest platform release (3.15) features an amazing update in the Phishing & Cybersquatting module, giving you the ability to detect a wider variety of cybersquatting threats in a...

Rooted-con
Blueliv sponsors RootedCON 2017

on

March 10, 2017

  This year we once again sponsored RootedCON, Madrid’s annual computer security conference. Our Professional Services team shared their highlights in this blog post. Security professionals from all over...

cyber-threat-intel-platform
Try the Blueliv Cyber Threat Intelligence Platform for free

on

March 3, 2017

  Do you want to improve your external threat visibility? The Blueliv Cyber Threat Intelligence Platform 14-day free trial is now available. During your trial Blueliv will look for...

rsa-usa-2017
RSA Conference USA 2017: one week on

on

February 23, 2017

Year after year, RSA continues to hold the title as the biggest annual IT security event. This year marked Blueliv’s third year of attendance at the renowned San Francisco...

313-platform-release
Platform release 3.13: enhanced data gathering

on

February 13, 2017

Our latest platform release (3.13) features three fantastic updates to increase customers’ cyber threat visibility and enable users to gather even more threat data than before. And of course,...

finance-sector-use-case
Cyber threat intel drives change in the finance sector

on

February 2, 2017

Our latest use case documents the implementation of targeted cyber threat intelligence to reduce the level of cyber risk challenging a major bank, and discusses common challenges relevant to...

privacy-aware
Data Privacy Day 2017 – be #privacyaware

on

January 26, 2017

Data has become the most valuable asset to brands big and small, but protecting it is increasingly difficult. It’s been estimated that there will be 30.7 billion connected devices...

rsa-conference-2017
Don’t miss Blueliv at RSA Conference USA 2017

on

January 20, 2017

DETECT AND REACT TO CYBER THREATS FASTER: advanced business threat search and monitoring “Most of the important things in the world have been accomplished by people who have kept...

isoc24
iSOC24 Morning Session: Cyber Threat Intelligence 24 Jan 2017

on

January 17, 2017

We’re pleased to share that we’ll be joining the agenda as a strategic vendor for iSOC24’s next ‘be in control’ morning session dedicated to Cyber Threat Intelligence in Culemborg,...

blueliv-proudest-moments-2016
2016 in review: Blueliv’s proudest moments

on

December 15, 2016

2016 has been an eventful year in every sense across the globe. Before we take a well-deserved break over the holidays and prepare ourselves for an even busier 2017,...

corporate-blueliv
Why Vawtrak v2 could be the next major banking Trojan

on

December 15, 2016

Neira Jones, Non-Executive Director Cognosec, Partner Global Cyber Alliance and industry influencer shares her thoughts on the evolution of banking Trojans and digital transformation in the finance sector in...

computer-security-day-2016
Computer Security Day 2016: Make a date with our malware sandbox

on

November 30, 2016

Today marks Computer Security Day 2016. Our responsibility to ensure the security of our networks and connected devices is ‘always on’ in an age when we are heavily dependent...

corporate-blueliv
Blueliv Invites Soltra Edge Users to Join Free Intelligence Sharing Platform

on

November 28, 2016

Blueliv Threat Exchange Network reassured by recent acquisition of Soltra Edge in continued effort to encourage collaboration and intelligence sharing in cyber security industry. BARCELONA, Spain – Nov. 28, 2016 – PRLog — Blueliv,...

corporate-blueliv
Blueliv in Gartner’s Hype Cycle for Infrastructure Protection 2016

on

November 25, 2016

In 2016, the threat level to enterprise IT continues to be at very high levels, with daily accounts in the press of large breaches and attacks. No single safeguard...

industry-blog
Don’t end up in the dark this Black Friday

on

November 22, 2016

Don’t end up in the dark this Black Friday! Online sales in the US are predicted to increase by over 13% this Black Friday vs. 2015, surpassing $3billion. Is...

corporate-blueliv
Platform release 3.11: making customers’ lives easier

on

November 18, 2016

The Product Dev team here at Blueliv is all about delivering continuous improvement to create a top-notch user experience. The latest Blueliv Threat Intelligence Platform release 3.11 includes five...

Mirai_code_2
Mirai: the people’s botnet

on

November 14, 2016

Mirai-botnet, the infamous IoT botnet, has struck again, and this time it almost took down an entire country; Liberia. Mirai botnet is a botnet that attempts to infect Internet...

ransomware
Ransomware – an up-to-date overview

on

November 9, 2016

Overview The Blueliv Threat Intel Research Labs team has recently analyzed a large amount of ransomware samples to obtain a global overview on the status quo of this malware...

NCSAM-2016-Building-resilience-in-critical-systems
NCSAM 2016: Building resilience in critical systems

on

November 4, 2016

Connectivity is critical nowadays, and we expect a highly reliable connection wherever we are, whatever we’re doing. Our dependency on being online forms a fundamental part of our global...

industry-blog
Some tricks look like treats: using Threat Intelligence to improve your cyber threat visibility

on

October 27, 2016

Social engineering techniques date back to classical mythology. Social engineering can take many different forms, yet the basic concept hasn’t evolved since the Ancient Greeks deployed the Trojan horse....

industry-blog
Our continuously connected lives: What’s your ‘apptitude’?

on

October 25, 2016

Recent news headlines reported one of the largest DDOS (Distributed Denial of Service) attacks to date. DNS service provider Dyn suffered multiple network outages affecting popular sites including Twitter,...

industry-blog
NCSAM 2016: Recognizing and combatting cybercrime

on

October 19, 2016

As we mark week three of National Cyber Security Awareness Month, we’re pausing to take stock of the many different forms of online crime. At Blueliv, we’re focused on...

industry-blog
From the Break Room to the Board Room: creating a culture of cyber security in the workplace – a start-up’s perspective

on

October 14, 2016

This October, we’re supporting National Cyber Security Awareness Month as an official champion. NCSAM is celebrated every October and marks a collaborative effort between government and industry to ensure...

industry-blog
NCSAM 2016: The basic steps to online safety and security

on

October 5, 2016

Blueliv is proud to be supporting National Cyber Security Awareness Month 2016. NCSAM is celebrated every October and marks a collaborative effort between government and industry to ensure every...

ransomware
From Barcelona to London: Blueliv at RANT! Risk and Network Threat forum

on

September 30, 2016

This week Blueliv sponsored its first RANT forum event at The Counting House in London to share the findings from the recent technical investigation into banking Trojan Vawtrak v2....

310-platform-release
3.10 Platform Release: Faster and smarter incident management

on

September 29, 2016

We’re pleased to announce the latest release of the Blueliv Cyber Threat Intelligence Platform. Release 3.10 brings you a number of functional improvements and new automated features to improve...

Vawtrak
Vawtrak v2: The next big banking Trojan

on

September 20, 2016

This month Blueliv Threat Intelligence Research Labs team has published an exclusive report revealing the most complete picture of Vawtrak v2 malware seen to date. Vawtrak is a serious...

corporate-blueliv
Gartner includes Blueliv in “Innovation Insight for MRTI” 2016 report

on

September 14, 2016

We’re pleased that Blueliv has been mentioned in the Gartner 2016 “Innovation Insight for Machine Readable Threat Intelligence (MRTI)” report as one of the: “Example Providers of Commercial Threat...

corporate-blueliv
Blueliv sponsors and attends CyberSecurity MeetUp, Helsinki

on

September 5, 2016

Blueliv was a proud sponsor of the recent CyberSecurity MeetUp held at Microsoft in Helsinki on 31 August 2016. Our very own Ramon Vicens, Research Labs VP, took part...

Vawtrak
Vawtrak banking Trojan: a threat to the banking ecosystem

on

August 19, 2016

Today marks the start of c0c0n International Cyber Security and Policing Conference 2016 where our Labs Research expert, Raashid Bhat, will be sharing insight into the threats posed by...

industry-blog
Hacking group Shadow Brokers infiltrate NSA Equation Group

on

August 18, 2016

Militarization of cyberspace is no longer a novelty. Instances of governments using sophisticated zero-day malware against other nations’ organizations and industry have been seen before now. This week a...

threat-exchange-network
New Release of Blueliv Threat Exchange Network

on

August 10, 2016

Cyber-criminals are very well organised and typically operate as part of highly sophisticated and specialised criminal organizations. Needless to say, in terms of the skills and methods used they...

Ransomware chronology
Ransomware – How to defend yourself against it

on

August 3, 2016

What is Ransomware? Ransomware is a type of malware that has lately been increasingly in use by the cyber criminals. In order to profit from the distribution of Ransomware,...

National-Cyber-Security-Awareness-Month-2016-Champion
Blueliv Becomes the “National Cyber Security Awareness Month 2016” Champion

on

July 28, 2016

We are happy to announce that Blueliv is supporting the National Cyber Security Awareness Month (NCSAM) 2016. NCSAM was created as a collaborative effort between government and industry to...

309-platform-release
Version 3.9 Platform Release feat. NEWS

on

July 26, 2016

While you guys have been fine-tuning your cyber defence strategies and finding ways to further improve your overall security postures, we have been busy making improvements to our Threat...

Inside-Tinba-Infection-Stage-2
Inside Tinba Infection: Stage 2

on

July 22, 2016

This is a continuation of the first Tinba post, which is part of a series of posts on how Tinba gradually infects a system. Before we jump into analysis,...

Cyber-Attacks-Targeting-SWIFT
Cyber Attacks Targeting SWIFT – Recap

on

July 13, 2016

SWIFT stands for Society for Worldwide Interbank Financial Telecommunication, and its purpose is to allow banks and financial institutions in general to communicate securely. It is used in the...

GoIgnite
Blueliv winner of Go Ignite, the scale up program led by four world class telcos

on

July 8, 2016

Go Ignite, an alliance between four telecoms, announced last week the five winners selected from its inaugural call for start-ups launched at Mobile World Congress 2016, which attracted over...

money-conf
MoneyConf 2016: Machine Learning, Big Data and Data Privacy

on

June 30, 2016

Blueliv was thrilled to participate for the first time in the latest edition of MoneyConf 2016, based in Madrid. The event offered us the possibility, to attend select panel...

Gartner-summit
The Gartner Security Summit Washington DC 2016

on

June 27, 2016

Blueliv had the pleasure of spending a couple of days with the wider Gartner community at Gartner’s annual security conference held in Washington DC. The event lasted three and...

money-conf
We will be at MoneyConf, where the world’s biggest banks and tech firms meet

on

June 17, 2016

Next week we will be exhibiting at MoneyConf, which is hitting Madrid on June 21 and June 22. MoneyConf focuses on the future of finance where the world-leading financial...

Inside-Tinba-DGA-Infection-Stage-1
Inside Tinba-DGA Infection: Stage 1

on

June 7, 2016

Tinba DGA is a bank trojan that was first discovered in 2012. It is mainly distributed through malware spam emails or malvertising. Although not a new threat, Tinba is still...

infosecurity2016
Blueliv at Infosecurity Europe London

on

June 2, 2016

We are happy to announce that next week Blueliv will be attending the Infosecurity conference in London, which will welcome the industry’s leading thought-leaders, practitioners, policy-makers and analysts. The...

corporate-blueliv
Blueliv at Gartner Security and Risk Management Summit

on

May 24, 2016

Next month on 13th of June Blueliv will attend the Gartner Security & Risk Management Summit in Washington, D.C. Gartner Security and Risk Management Summit 2016 provides attendees with proven...

Demo Free Trial Community