Blueliv
Blog & Resources

Blog

10 things you need to know about brand abuse and how to stay alerted to them

Brand abuse is a big problem, and it’s getting bigger. Between 2010-2014, the EU, US, and Japanese customs authorities seized and estimated €467.5M EU / $953.2M US / ¥100M JA in counterfeited products from China alone. The next 4 countries–Hong Kong, Turkey, Greece, and Panama–accounted for another third. Brand abuse can come from pirate operators around the globe or from espionage within the walls of your own hijacked systems and breached intelligence. Fraudsters can infiltrate at every stage of […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

How banks can protect customers from “Man in the browser attacks”

Criminal groups use a wide range of methods to compromise users and siphon its bank accounts, for this reason, when a user’s computer is infected by a malware, depending on its main goal and its capabilities, it could use multiple methods to obtain sensitive information, such as changing the DNS resolution or proxy pollution to redirect the user to a malicious site, searching on the filesystem for stored passwords, inspecting the main memory, infecting the browsers and/or libraries they […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Targeted Malware Detection

Today’s cyber criminal wants one thing. He wants to get his malware into your IT network because once he’s in, he can go to work–remotely–achieving the myriad of other criminal activities he and his accomplices have in mind. Your best defense against targeted malware is to thwart the criminal actor before he gets to you, your network, or your colleagues. An early warning system is critical to gaining the insight you need to inform end users. People, sadly, are […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Avoid the cost and headache of leaked data (here’s how)

“Leaked data falls into 4 types,” says Peter Gordon from SANS Institute: confidential information, intellectual property, customer data and health records. Data leakage, however, is not limited to deliberate efforts of cyber espionage. In fact, a surprising amount of it tends to be the result of human error–well into the 90th percentile for insider threats. That means a bulk of insider data leakage is unintentional. Regardless of intent, leaked data can have a devastating financial effect on an organization. […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Successful CISO 360 Congress sponsored by Blueliv

Last week, Pulse Conferences hosted the CISO 360 Congress at the Grand Marina hotel in Barcelona; an incomparable frame by the Mediterranean Sea where more than 80 CISOs gathered to discuss the most trendy and relevant cyber security topics. The event went on for 3 days and it gave us a great occasion to learn, exchange with peers and keep ourselves up- to-date with state of art cyber security practices.   Cyber threat landscape high in the agenda This […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

The many colors of cybersquatting – Do not underestimate them

Blueliv Guest Post | Jean-Jacques Dahan, Managing Director and Expert Consultant for Online Brand Security & Global Domain Strategy at Zeusmark. Cybersquatting is a constant challenge for a company. It is a broad concept involving many aspects of risk, speculation, and fraud. It should not be underestimated as it provides a breeding ground for many businesses and reputation-jeopardising activities, resulting in financial and consumer security failures. A company might treat cybersquatting on a case-by-case basis with no specific long-term mitigation process. […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Protect your business against ruthless cybersquatters

Also this week: Blueliv is pleased to announce a featured post on the subject of Cybersquatting from Jean-Jacques Dahan–Managing Director and Expert Consultant for Online Brand Security & Global Domain Strategy, Zeusmark. This article continues the discussion begun with the Phishing module article. Now, the focus will be on how to defend yourself against Cybersquatting. Blueliv offers one module that handles both.   Brand Integrity and the Value of a Trademark To understand Cybersquatting, you must first consider customer […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Petya Ransomware cyber attack is spreading across the globe – Part 2

Following our first blog providing an early analysis about Petya, we are sharing further findings of the malware analysis that we have performed. We divided this post into the three areas we have briefly analyzed after the Petya attack: the propagation techniques of the malware, the encryption techniques used, and how to detect it. Propagation: Exploit It seems that might be using exploits to propagate itself (EternalBlue). In addition to EternalBlue and EternalRomance, it uses DoublePulsar to inject DLLs […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Petya Ransomware cyber attack is spreading across the globe – Part 1

As you might know, Petya Ransomware is currently devastating Airlines, Banks & Utilities and many other businesses across the globe. Denmark, France, Spain, Ukraine, and the USA are already impacted and many others might be too in the coming hours. So far, it seems that the sample is being distributed with an RTF file which drops a DLL as a payload to block the system. Protect your business before it is too late! Export multiples IOC´s shared on the […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Business threat intelligence | Win the fight against phishing attacks

Blueliv has one module that handles two of the main cyber threats targeted at businesses–Phishing and Cybersquatting. This module plugs into our threat monitoring Enterprise Platform Solution. For completeness, we’ll divide these threats into separate articles. First, it’s important to understand the inherent nature of these attacks. Criminals who steal are not all the same. There’s a clear distinction between a thief and a robber. A robber takes something from you by force. In the cyber world, that’s the […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone