Blueliv
Blog & Resources

Blog

Inside Tinba Infection: Stage 2

This is a continuation of the first Tinba post, which is part of a series of posts on how Tinba gradually infects a system. Before we jump into analysis, let’s do a quick recap of the previous actions performed by Tinba and described in the STAGE 1 post: Prepares a second layer payload Rewrites its own header with such payload JMP to the new EntryPoint Decrypt and copy another layer to a new section JMPs to the new section […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Cyber Attacks Targeting SWIFT – Recap

SWIFT stands for Society for Worldwide Interbank Financial Telecommunication, and its purpose is to allow banks and financial institutions in general to communicate securely. It is used in the exchange of information between banks, such as transactions. In this post you will get a short summary of the incidents and a brief description on how these attacks are usually carried-out. In addition, we’ll also provide some Yara rules and IoCs that will allow you and your company to detect […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Blueliv winner of Go Ignite, the scale up program led by four world class telcos

Go Ignite, an alliance between four telecoms, announced last week the five winners selected from its inaugural call for start-ups launched at Mobile World Congress 2016, which attracted over 142 applications from the global start-up community. The winners were selected from the following categories: cyber security, big data analytics, content delivery and customer experience enhancement. We were one of the five winning start-ups and will be provided with business development opportunities by the partners of the Go Ignite alliance […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

MoneyConf 2016: Machine Learning, Big Data and Data Privacy

Blueliv was thrilled to participate for the first time in the latest edition of MoneyConf 2016, based in Madrid. The event offered us the possibility, to attend select panel sessions and participate to roundtables with Top-level financial decision makers and introduce our Cybersecurity solution. We also had the privilege to discuss with the different different financial industry professionals ranging from the most promising Fintech startups to the wealthiest global retail banks. It is no news that the financial system […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

The Gartner Security Summit Washington DC 2016

Blueliv had the pleasure of spending a couple of days with the wider Gartner community at Gartner’s annual security conference held in Washington DC. The event lasted three and a half days and covered a wide range of security topics. The purpose of this blog post is to cover only what was said and discussed with respect to threat intelligence. I think it is fair to say that there is a considerable amount of cynicism that has now attached […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

We will be at MoneyConf, where the world’s biggest banks and tech firms meet

Next week we will be exhibiting at MoneyConf, which is hitting Madrid on June 21 and June 22. MoneyConf focuses on the future of finance where the world-leading financial institutions will mix with the most promising tech startups, such as Blueliv. Leading financial institutions find themselves facing a rising tide of cyber threats to which they have no control of. They can only be aware and be prepared for their attack. Track threats in real-time, gain visibility into emerging […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Inside Tinba-DGA Infection: Stage 1

Tinba DGA is a bank trojan that was first discovered in 2012. It is mainly distributed through malware spam emails or malvertising. Although not a new threat, Tinba is still one of the used trojans by criminals to steal online banking sensitive information. There are a number of papers on how Tinba-DGA (Tiny Banker with Domain Generation Algorithm) works once it infects a system, how the web injects are used, and what type of hooks are performed on the system. But what about examining […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Blueliv at Infosecurity Europe London

We are happy to announce that next week Blueliv will be attending the Infosecurity conference in London, which will welcome the industry’s leading thought-leaders, practitioners, policy-makers and analysts. The 21st edition of Infosecurity Europe, Europe’s largest and most comprehensive Information Security event, will see more companies exhibit than ever before when it opens its doors on 7 June – including three times more new exhibitors than in 2015.   In addition, Infosecurity Europe’s Conference Programme will host over 160 hours […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Blueliv at Gartner Security and Risk Management Summit

Next month on 13th of June Blueliv will attend the Gartner Security & Risk Management Summit in Washington, D.C. Gartner Security and Risk Management Summit 2016 provides attendees with proven practices and strategies needed to maintain cost-effective security and risk programs to support digital business and drive enterprise success. The comprehensive 2016 agenda addresses the latest threats, flexible new security architectures, governance strategies and more. It’s a unique opportunity to reinvent your approach to security and risk for the digital […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone

Blueliv continues with a strong momentum

We are happy to share the news of an unprecedented momentum we are currently experiencing at Blueliv with you. Last year we were named Gartner Cool Vendor in Communications Service Provider Security, where we were selected as one of the most promising, valuable, and innovative companies that enable telecoms and CSPs to maintain the gold standard network protection. This year we want to continue to improve and to excel on this path. Strategic Business Partnerships Over the past few […] Read More

Tweet about this on TwitterShare on LinkedInGoogle+Share on FacebookEmail to someone