Industry

The latest news and opinions relating to the wider cybersecurity ecosystem. Find analysis, practical information and advice for cybersecurity professionals of all levels, including summaries from the Blueliv Threat Exchange Network.

Threat Exchange Network blog: July 2018

on

August 1, 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in...

Threat Exchange Network blog: June 2018

on

July 2, 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in...

Combatting password re-use

on

May 9, 2018
A recent article on The Register discussed an academic paper proposing that high-profile websites cooperate to stop users re-using passwords. If sites like Twitter and Facebook share users’ credentials,...

industry-blog
Threat Exchange Network blog: April 2018

on

May 3, 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and...

industry-blog
Threat Exchange Network blog: March 2018

on

March 27, 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and...

industry-blog
Blueliv Annual Cyberthreat Report advises increased intelligence sharing and cross-industry collaboration

on

March 7, 2018
Malware advances no longer focused on ‘traditional’ enterprise targets as cybercriminals expand their scope Today we release our Annual Cyberthreat Report, compiling actionable intelligence from Threat Compass with expert...

industry-blog
Threat Exchange Network blog: February 2018

on

March 1, 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and...

industry-blog
Threat Exchange Network blog: January 2018

on

February 1, 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and...

CISO-360-Congress
Successful CISO 360 Congress sponsored by Blueliv

on

July 10, 2017
Last week, Pulse Conferences hosted the CISO 360 Congress at the Grand Marina hotel in Barcelona; an incomparable frame by the Mediterranean Sea where more than 80 CISOs gathered...

Infosec
Blueliv at Infosecurity Europe 2017

on

June 14, 2017
This year, we had the opportunity to exhibit in this year’s edition of Infosecurity Europe (Infosec) in London, Europe’s largest and most comprehensive Information Security event, which welcomed more...

wannacry
Wannacry Ransomware used to spread global cyber attacks

on

May 12, 2017
A global ransomware attack began impacting companies and hospitals across the United States, Europe, and Asia early Friday morning. Companies in more than 70 countries have reported incidents as...

wannacry2
El ransomware ataca contundentemente el IBEX-35
Este viernes ha saltado la noticia de que el ransomware “WannaCry” se ha colado en los sistemas informáticos de algunas de las empresas del IBEX-35 aprovechando una vulnerabilidad de...

Rooted-con
Blueliv sponsors RootedCON 2017

on

March 10, 2017
  This year we once again sponsored RootedCON, Madrid’s annual computer security conference. Our Professional Services team shared their highlights in this blog post. Security professionals from all over...

finance-sector-use-case
Cyber threat intel drives change in the finance sector

on

February 2, 2017
Our latest use case documents the implementation of targeted cyber threat intelligence to reduce the level of cyber risk challenging a major bank, and discusses common challenges relevant to...

privacy-aware
Data Privacy Day 2017 – be #privacyaware

on

January 26, 2017
Data has become the most valuable asset to brands big and small, but protecting it is increasingly difficult. It’s been estimated that there will be 30.7 billion connected devices...

isoc24
iSOC24 Morning Session: Cyber Threat Intelligence 24 Jan 2017

on

January 17, 2017
We’re pleased to share that we’ll be joining the agenda as a strategic vendor for iSOC24’s next ‘be in control’ morning session dedicated to Cyber Threat Intelligence in Culemborg,...

computer-security-day-2016
Computer Security Day 2016: Make a date with our malware sandbox

on

November 30, 2016
Today marks Computer Security Day 2016. Our responsibility to ensure the security of our networks and connected devices is ‘always on’ in an age when we are heavily dependent...

industry-blog
Don’t end up in the dark this Black Friday

on

November 22, 2016
Don’t end up in the dark this Black Friday! Online sales in the US are predicted to increase by over 13% this Black Friday vs. 2015, surpassing $3billion. Is...

NCSAM-2016-Building-resilience-in-critical-systems
NCSAM 2016: Building resilience in critical systems

on

November 4, 2016
Connectivity is critical nowadays, and we expect a highly reliable connection wherever we are, whatever we’re doing. Our dependency on being online forms a fundamental part of our global...

industry-blog
Some tricks look like treats: using Threat Intelligence to improve your cyber threat visibility

on

October 27, 2016
Social engineering techniques date back to classical mythology. Social engineering can take many different forms, yet the basic concept hasn’t evolved since the Ancient Greeks deployed the Trojan horse....

industry-blog
Our continuously connected lives: What’s your ‘apptitude’?

on

October 25, 2016
Recent news headlines reported one of the largest DDOS (Distributed Denial of Service) attacks to date. DNS service provider Dyn suffered multiple network outages affecting popular sites including Twitter,...

industry-blog
NCSAM 2016: Recognizing and combatting cybercrime

on

October 19, 2016
As we mark week three of National Cyber Security Awareness Month, we’re pausing to take stock of the many different forms of online crime. At Blueliv, we’re focused on...

industry-blog
From the Break Room to the Board Room: creating a culture of cyber security in the workplace – a start-up’s perspective

on

October 14, 2016
This October, we’re supporting National Cyber Security Awareness Month as an official champion. NCSAM is celebrated every October and marks a collaborative effort between government and industry to ensure...

industry-blog
NCSAM 2016: The basic steps to online safety and security

on

October 5, 2016
Blueliv is proud to be supporting National Cyber Security Awareness Month 2016. NCSAM is celebrated every October and marks a collaborative effort between government and industry to ensure every...

industry-blog
Hacking group Shadow Brokers infiltrate NSA Equation Group

on

August 18, 2016
Militarization of cyberspace is no longer a novelty. Instances of governments using sophisticated zero-day malware against other nations’ organizations and industry have been seen before now. This week a...

Adaptive Security Model
Possible approaches to adaptive security

on

May 5, 2016
Traditional approaches to integrating cyber threat intelligence into an adaptive security model have relied very heavily on utilizing open source threat intelligence feeds and integrating these into a SIEM....

industry-blog
No cON Name’15, Summary of the Spanish Premier Technical Security Conference

on

December 18, 2015
For those of you who haven’t heard about it, No cON Name is a Spanish security conference that takes place in Barcelona every year, where experts from all around Spain,...

industry-blog
Collaborative Information Exchange Models to Fight Cyber Threats

on

October 7, 2015
The fight against cybercrime should take on a new direction. It should utilize the collaborative models of social media also referred to as Web 2.0 technologies that allow for...

industry-blog
Want to fight cyber threats? Start collaborating

on

August 21, 2015
It is universally known that no one, be it an individual or a company, can hope to find and neutralize every threat that can be found out in the...

Blueliv-Releases-Q2-2015-Global-Cyber-Threat-Report
Blueliv Releases Q2 2015 Global Cyber Threat Report

on

August 6, 2015
Through its cyber threat intelligence platform Blueliv detected and analyzed 5 million stolen credentials and credit cards, 200,000 targeted malware samples, and 500,000 crime servers between April and June...

industry-blog
Threat Intelligence & RSA

on

May 28, 2015
Cyber Defense Magazine has just published the following article of Nahim Fazal, Head of International Business Development at Blueliv. RSA 2015 was very much the year of Threat Intelligence. That is...

industry-blog
How could UBER accounts have been compromised?

on

April 6, 2015
Uber is an American company that develops and operates a mobile application that allows users to provide and employ transporting services for people. Motherboard reported last week that thousands...

industry-blog
How to avoid a Dridex infection?

on

March 25, 2015
In the recent days we have been seeing a lot of commotion around the botnet Dridex. This improved version of Dridex is proliferating thanks to an effective phishing campaign....

industry-blog
Actionable Approach to Fighting Cybercrime using Cyber Threat Intelligence

on

January 13, 2015
Cyber Defense Magazine has recently published the following article of Dennis Lee, Territory Manager North America at Blueliv. Organizations are finding themselves in a world where having defensive controls like a firewall,...

industry-blog
Botconf 2014 – Day 3

on

December 9, 2014
This third and last day of this great experience started with an awesome speech from Hendrik Adrian and Dhia Mahjoub about Fast Flux Proxy Networks, which is a DNS...

industry-blog
Botconf 2014 – Day 2

on

December 5, 2014
Today it’s been a long day with many interesting speeches, starting with a technical workshop on how to debug rootkits with windbg, and ending with a great research work,...

industry-blog
Botconf 2014 – Day 1

on

December 4, 2014
Lot of things to talk about in just one day at Botconf conference in Nancy, France. Great talks and amazing people, let’s do a short summary of some of...

industry-blog
People becoming unfazed to cyber attacks?

on

October 15, 2014
When Target was hacked last year the incident made headline news for months. Target reported that their Q4 sales dropped 46% and their stock took an 11% dip. Most...

industry-blog
Cyber-attack against JPMorgan Chase

on

October 9, 2014
A cyber-attack targeting JPMorgan Chase this summer compromised over 75 million household according to a statement recently released by Chase Bank. The data stolen included names, addresses and email...

Community Trial Demo