Blog

The Blueliv blog is home to the latest threat intelligence analysis, content from investigations, corporate news, information about our modular cyberthreat intelligence solutions, and more. Take some time to explore the archives and perspectives from our intelligence analysts and management team.

National-Cyber-Security-Awareness-Month-2016-Champion
Blueliv Becomes the “National Cyber Security Awareness Month 2016” Champion

on

July 28, 2016

We are happy to announce that Blueliv is supporting the National Cyber Security Awareness Month (NCSAM) 2016. NCSAM was created as a collaborative effort between government and industry to...

309-platform-release
Version 3.9 Platform Release feat. NEWS

on

July 26, 2016

While you guys have been fine-tuning your cyber defence strategies and finding ways to further improve your overall security postures, we have been busy making improvements to our Threat...

Inside-Tinba-Infection-Stage-2
Inside Tinba Infection: Stage 2

on

July 22, 2016

This is a continuation of the first Tinba post, which is part of a series of posts on how Tinba gradually infects a system. Before we jump into analysis,...

Cyber-Attacks-Targeting-SWIFT
Cyber Attacks Targeting SWIFT – Recap

on

July 13, 2016

SWIFT stands for Society for Worldwide Interbank Financial Telecommunication, and its purpose is to allow banks and financial institutions in general to communicate securely. It is used in the...

GoIgnite
Blueliv winner of Go Ignite, the scale up program led by four world class telcos

on

July 8, 2016

Go Ignite, an alliance between four telecoms, announced last week the five winners selected from its inaugural call for start-ups launched at Mobile World Congress 2016, which attracted over...

money-conf
MoneyConf 2016: Machine Learning, Big Data and Data Privacy

on

June 30, 2016

Blueliv was thrilled to participate for the first time in the latest edition of MoneyConf 2016, based in Madrid. The event offered us the possibility, to attend select panel...

Gartner-summit
The Gartner Security Summit Washington DC 2016

on

June 27, 2016

Blueliv had the pleasure of spending a couple of days with the wider Gartner community at Gartner’s annual security conference held in Washington DC. The event lasted three and...

money-conf
We will be at MoneyConf, where the world’s biggest banks and tech firms meet

on

June 17, 2016

Next week we will be exhibiting at MoneyConf, which is hitting Madrid on June 21 and June 22. MoneyConf focuses on the future of finance where the world-leading financial...

Inside-Tinba-DGA-Infection-Stage-1
Inside Tinba-DGA Infection: Stage 1

on

June 7, 2016

Tinba DGA is a bank trojan that was first discovered in 2012. It is mainly distributed through malware spam emails or malvertising. Although not a new threat, Tinba is still...

infosecurity2016
Blueliv at Infosecurity Europe London

on

June 2, 2016

We are happy to announce that next week Blueliv will be attending the Infosecurity conference in London, which will welcome the industry’s leading thought-leaders, practitioners, policy-makers and analysts. The...

corporate-blueliv
Blueliv at Gartner Security and Risk Management Summit

on

May 24, 2016

Next month on 13th of June Blueliv will attend the Gartner Security & Risk Management Summit in Washington, D.C. Gartner Security and Risk Management Summit 2016 provides attendees with proven...

corporate-blueliv
Blueliv continues with a strong momentum

on

May 20, 2016

We are happy to share the news of an unprecedented momentum we are currently experiencing at Blueliv with you. Last year we were named Gartner Cool Vendor in Communications...

corporate-blueliv
Blueliv is selected as part of Momentum Partners Cyber Security Review Q1 2016

on

May 11, 2016

We are happy to announce that Blueliv has been included in the Momentum Partners Q1 2016 Cyber Security Market Review as one of the most interesting companies in the...

Adaptive Security Model
Possible approaches to adaptive security

on

May 5, 2016

Traditional approaches to integrating cyber threat intelligence into an adaptive security model have relied very heavily on utilizing open source threat intelligence feeds and integrating these into a SIEM....

Securmatica-2016-Recap
Securmatica 2016 Recap

on

April 28, 2016

Last week the 27th annual Spanish security congress Securmatica took place. The purpose of the summit was to analyze the key factors in the cyber security industry, to showcase...

corporate-blueliv
Fast and affordable threat intelligence for MSSP

on

April 20, 2016

Rapidly changing threat vectors are too overwhelming for most medium-sized and large businesses to take on alone. They lack qualified, dedicated cyber threat intelligence professionals, because these resources are...

threat-exchange-network
Here is the Blueliv Threat Exchange Network!

on

April 14, 2016

This week marks an important milestone for us here at Blueliv with the announcement of our Threat Exchange Network (beta version). A new release of our strong collaborative community...

Malware-grabbers-and-their-behavior
Malware grabbers and their behavior

on

April 8, 2016

Malware is made to serve very different kinds of purposes, which depend on the objective of the authors. Nowadays, there is a very large number of samples that exist...

corporate-blueliv
Blueliv will be at Securmatica

on

April 1, 2016

As the previous years, Blueliv will be sponsoring the standout infosec event Securmatica. The security congress will take place from April 26th to 28th in Madrid with the title “¿Qué...

Cyber-Security-Trends-2016
Cyber Security Trends 2016: Prevention, defence and reaction are priorities

on

March 23, 2016

The complexity of cyber threats will keep on growing so that traditional security measures will be unable to reduce them. CISOs will be forced to rethink on how to operate...

corporate-blueliv
Blueliv at “The new security paradigm” Telefonica’s event in Paris

on

March 17, 2016

Next April 5th we will participate in the Telefonica’s event “The new security paradigm: innovation and proactivity”, which will take place in Paris. The security landscape is constantly changing with...

corporate-blueliv
Summary of the Security Conference RootedCON’16

on

March 8, 2016

As some of you might know, we’ve been sponsoring this year’s edition of the  cyber security RootedCON16 conference which took place in Madrid last week. This Spanish security conference is...

RSA-2016-Recap
RSA 2016 Recap!

on

March 4, 2016

Last week was an exciting week for all of us at Blueliv who were fortunate enough to attend the RSA 2016 Cyber Security Conference in San Francisco where we...

Antihooking-techniques-used-by-Andromeda-aim-to-defeat-Cuckoo-like-sandboxes
Antihooking techniques used by Andromeda aim to defeat Cuckoo-like sandboxes

on

March 1, 2016

Some sandboxes, for example, Cuckoo Sandbox, implement a technique known as hooking. The hooking of functions allows the programmer, user or analyst to intercept calls, messages or events passed...

corporate-blueliv
Blueliv supports Rooted CON 2016

on

February 24, 2016

Next week a new edition of the Rooted CON 2016 computer security conference will take place in Madrid, March 4 – 7 and we are proud to announce that we will sponsor the...

corporate-blueliv
Video: Get started using our malware analysis sandbox today

on

February 18, 2016

A couple of weeks ago we launched a new community feature, our online malware analysis sandbox and now, it’s time to show you how it works and the varied...

corporate-blueliv
Meet Blueliv team at RSA, booth S738

on

February 9, 2016

The countdown begins for the most established IT security event in the world, RSA Conference. As a proud participant in RSA, we invite you to join us at booth #S738 South Hall...

research-blog
Tracking the footprints of PushDo Trojan

on

February 1, 2016

PushDo Trojan is a downloader trojan responsible for downloading its spam counterpart and other malicious Trojans. Since its beginning, it has evolved into many different versions and in this...

corporate-blueliv
Visit Blueliv at RSA Conference, booth #S738

on

January 19, 2016

It’s that time of the year again – time for one of our favorite conferences, RSA! Last year was our first year at RSA and we are thrilled to be...

Adaptive-Security-Architecture-to-protect-companies
Adaptive Security Architecture to protect companies from Advanced Attacks

on

January 13, 2016

Adaptive security will become one of the key phrases you will hear over and over again this year. As with many new concepts, the term itself can be hindered...

corporate-blueliv
The best of Blueliv’s blog: Most read posts of 2015

on

January 7, 2016

Catching up on some reading this week? We took a look back at Blueliv’s blog posts in 2015 to see which stories were most read by our audience and...

corporate-blueliv
Merry Christmas and Happy New Year!

on

December 22, 2015

At the holiday season, our thoughts turn to those who have made Blueliv’s progress possible. It is in this spirit we would like to say: Thank you and best...

industry-blog
No cON Name’15, Summary of the Spanish Premier Technical Security Conference

on

December 18, 2015

For those of you who haven’t heard about it, No cON Name is a Spanish security conference that takes place in Barcelona every year, where experts from all around Spain,...

corporate-blueliv
Revisiting Blueliv’s most popular news of the year

on

December 17, 2015

This year is just about over and it’s almost time to welcome 2016. We love the reflection that comes along with the close of a time period, and the...

corporate-blueliv
Botconf’15, the botnet fighting conference

on

December 9, 2015

As you probably already know if you have been following us on twitter, Blueliv has attended the Botconf this year, the only international conference totally dedicated to the fight against botnets...

corporate-blueliv
Blueliv and IPS announce partnership to deliver world-class threat intelligence solutions to the Canadian market

on

December 4, 2015

Today we announce that we have signed a strategic partnership with IPS, a leading Canadian provider of information security, compliance and managed security services. As a first-class provider of...

corporate-blueliv
An open and agile malware analysis sandbox, the new community feature

on

November 24, 2015

Blueliv has always been focused on trying to make Cyber Intelligence available for everyone and believes that sharing intelligence is the key to get the upper hand in an...

corporate-blueliv
ThreatStream and Blueliv announce a partnership to offer unique cyber threat intelligence

on

November 19, 2015

Following our intelligence sharing philosophy, we are happy to announce our alliance with ThreatStream. From today, the Blueliv Threat Intelligence Feed will be part of the ThreatStream Alliance of...

Blueliv-Releases-Q3-2015-Global-Cyber-Threat-Report
Blueliv Releases Q3 2015 Global Cyber Threat Report

on

November 10, 2015

  Between July and September 2015 Blueliv detected and analyzed 5.5 million stolen credentials and credit cards, 300,000 targeted malware samples, and 500,000 crime servers through its cyber threat intelligence...

Revisiting-the-latest-version-of-Andromeda-Gamarue-Malware1
Revisiting the latest version of Andromeda/Gamarue Malware

on

November 5, 2015

Andromeda Malware aka Gamarue Malware has been prevalent since it came into limelight a couple of years ago. Also, the author keeps it well updated ever since. With respect to...

corporate-blueliv
Secure Group and Blueliv announce strategic partnership to deliver Security Intelligence in Italy

on

November 3, 2015

We continue expanding globally and today, we are happy to inform you that we have signed a strategic partnership with Secure Group, the Security Division of Yotta Tecnologie and...

Dridex-reloaded
Dridex reloaded?

on

October 27, 2015

Dridex has been the scourge of banks regarding bank data and credential theft as well as fraud in the last 12 months. Cyber criminals have been improving the network...

corporate-blueliv
Blueliv supports the 2015 National Cyber Security Awareness Month

on

October 21, 2015

October 1 marked the start of the 12th annual 2015 National Cyber Security Awareness Month (NCSAM), led by the National Cyber Security Alliance (NCSA), and we are happy to announce that Blueliv...

corporate-blueliv
Blueliv supports the 2015 National Cyber Security Awareness Month

on

October 15, 2015

Blueliv has developed an input plugin for Logstash that, with the help of the ELK stack, provides real-time, actionable cyber threat intelligence to help organisations understand the scale of cyber...

industry-blog
Collaborative Information Exchange Models to Fight Cyber Threats

on

October 7, 2015

The fight against cybercrime should take on a new direction. It should utilize the collaborative models of social media also referred to as Web 2.0 technologies that allow for...

October-events
October events

on

October 1, 2015

Experts from Blueliv are going to participate in a range of events in October. We want to share them with you, as they might be of your interest, that’s...

Introduction-to-honeypots
Introduction to honeypots

on

September 29, 2015

As most of you already know, honeypots are hosts that act as a bait, exposing services on the internet in order to lure attackers. Below is a honeypots introduction....

corporate-blueliv
Blueliv, speaker at the next Barcelona Elastic Meetup

on

September 22, 2015

We are really happy to announce that Blueliv will participate in the next Barcelona Elastic Meetup, which will take place on October 7th at Itnig. There, João Alves, Software...

corporate-blueliv
La socialización de la lucha contra las ciberamenazas

on

September 17, 2015

La revista de ciberseguridad SIC ha publicado en su número de septiembre el artículo escrito por Daniel Solís, CEO de Blueliv, La socialización de la lucha contra las ciberamenazas. La lucha contra el...

corporate-blueliv
Splunk App for Blueliv tutorial

on

September 9, 2015

As you may already know, the Splunk® App for Blueliv is available for users to be able to access the Blueliv’s Cyber Threat Information Intelligence Feed through Splunk console....

Botnets-and-C&C-Trial
Botnets and C&C Trial: Detect Infections in your Computer and Retrieve Compromised Credentials

on

September 3, 2015

Botnets and other malicious software attacks that compromise corporate PCs are increasing at an alarming rate and growing in sophistication. In the first half of the year, Blueliv detected...

corporate-blueliv
September events

on

August 27, 2015

August is getting to its end and it’s time to think of the coming school year, which is around the corner full of new projects. At Blueliv we are...

industry-blog
Want to fight cyber threats? Start collaborating

on

August 21, 2015

It is universally known that no one, be it an individual or a company, can hope to find and neutralize every threat that can be found out in the...

Blueliv-Releases-Q2-2015-Global-Cyber-Threat-Report
Blueliv Releases Q2 2015 Global Cyber Threat Report

on

August 6, 2015

Through its cyber threat intelligence platform Blueliv detected and analyzed 5 million stolen credentials and credit cards, 200,000 targeted malware samples, and 500,000 crime servers between April and June...

research-blog
Blueliv discovers the Alina variant – Joker

on

August 4, 2015

Joker malware is a Point of Sale malware that was developed using, as a baseline, the Alina POS source code. After tracking it for some weeks, we’ve realized that...

corporate-blueliv
Are your IPs infected? Check it now!

on

July 30, 2015

We are excited to introduce to you a new IP infection detection tool on our community: you can now look up an IP and see if it belongs to...

corporate-blueliv
Cyber Threat Data Feed, ultra fresh intelligence at your fingertips

on

July 27, 2015

We are pleased to announce that we have launched the Cyber Threat Intelligence Data Feed which will allow any organization to track the threats that are aligned against it in real-time...

corporate-blueliv
Empowering your ELK stack with Blueliv plugin

on

July 16, 2015

We have just released a new application for ELK stack. The ELK stack contains Elasticsearch, Logstash, and Kibana. Although they have all been built to work exceptionally well together, each one is...

Introduction-to-Android-Malware
Introduction to Android Malware

on

July 9, 2015

Hello everyone! As some of you already know, mobile threats are on the rise. Every day there are more and more mobile devices, which translates in more targets for...

corporate-blueliv
We will paticipate at the Innovation in cyber security applied to the protection of digital identity summer course

on

July 3, 2015

Next week we will participate in the Innovation in cyber security applied to the protection of digital identity summer course. The course, which is organized by the Rey Juan Carlos...

corporate-blueliv
We keep growing and internationalizing!

on

July 1, 2015

Some months ago we told you we moved into a bigger new office in Barcelona. Today we are glad to let you know we have opened two new international...

research-blog
Webinar. Chasing the Cyber Crime: network insights of Dyre and Dridex Trojan Bankers.

on

June 29, 2015

We would like to invite you to the Chasing the Cyber Crime: network insights of Dyre and Dridex Trojan Bankers webinar on the 8th of July.  As you may already know,...

corporate-blueliv
We will be at BSides Lisbon 2015

on

June 26, 2015

Next week, July 3rd, we will be sponsoring BSides Lisbon 2015. The security conference will consist of two tracks with really interesting security talks.   We want to give...

Why-is-Blueliv-Gartner-cool
Why is Blueliv Gartner “cool”?

on

June 18, 2015

Recently Blueliv has been designated a Cool Vendor in Communications Service Provider Security, 2015 and in this post I want to try and encapsulate what was it that made us...

research-blog
Introduction to Blueliv’s API, part1

on

June 16, 2015

Greetings everyone! Today we want to introduce you a little bit more to our API and show you all the amazing things you can do with the data. This...

corporate-blueliv
Python SDK to access our Cyber Threat Intelligence API, updated

on

June 11, 2015

We have just updated the Python SDK to access our API. Using our Python SDK allows you to take advantage of our cyber-threat intelligence data faster, requiring less coding...

corporate-blueliv
Blueliv named a “Cool Vendor” by Gartner

on

June 4, 2015

We are proud to announce that Blueliv has been included in the list of “Cool Vendors” in the 2015 report titled, “Cool Vendors in Communications Service Provider Security, 2015”...

industry-blog
Threat Intelligence & RSA

on

May 28, 2015

Cyber Defense Magazine has just published the following article of Nahim Fazal, Head of International Business Development at Blueliv. RSA 2015 was very much the year of Threat Intelligence. That is...

research-blog
Performing automated Yara Q&A with Cuckoo

on

May 21, 2015

As it is well known, Cuckoo Sandbox is a malware analysis system which allows us to customize both processing and reporting stages. In this context, we can feed Cuckoo with...

corporate-blueliv
Want different results? Quit doing the same. Interview with Daniel Solis, CEO & Founder

on

May 19, 2015

In one phrase, define Blueliv. We are the innovators, the paradigm-shifters. We’re a company dedicated to fighting cyber threats in ways no one has ever done before. With this...

Fighting-cyber-crime-by-using-Splunk
Fighting cyber crime by using Splunk

on

May 15, 2015

As we told you in the post about our free API, threat intelligence is the key factor in the fight against cyber crime and cyber threats, mostly because this...

Blueliv-Releases-Q1-2015-Global-Cyber-Threat-Report
Blueliv Releases Q1 2015 Global Cyber Threat Report

on

May 13, 2015

  Blueliv reveals startling scale of cybercrime, pinpoints geolocations most affected Dyre and Dridex, the most nefarious banking Trojans Blueliv releases its Cyber Threat Report, revealing detailed figures on...

corporate-blueliv
New Splunk App for Blueliv

on

May 8, 2015

Blueliv has just released a new application for Splunk®. Splunk is an event analyzer that collects data generated by any source and provides the user with tools and dashboards...

corporate-blueliv
We are pleased to share our cyber space video with you!

on

May 7, 2015

We are pleased to announce that Blueliv’s video is ready for the cyber world to view. The video, based on a cyber space video game, explains how our targeted cyber threat...

research-blog
Ciberamenazas emergentes. A qué nos enfrentamos y cómo lo combatimos

on

April 30, 2015

La revista de ciberseguridad SIC ha publicado en su número de abril el artículo escrito por Ramón Vicens, VP Threat Intelligence de Blueliv, y Víctor Acín, analista de Threat...

corporate-blueliv
Join Blueliv in the fight against cybercrime with our free API

on

April 27, 2015

From Blueliv we believe that sharing expertise and intelligence is the key to get the upper hand in an ever-changing war on cyber crime. But the issue, usually, is...

Blueliv-Releases-Q1-2015-Global-Cyber-Threat-Report
Chasing cybercrime: network insights of Dyre and Dridex Trojan bankers. (Report)

on

April 22, 2015

Trojan Bankers are a family of botnets that specialize in stealing information related to the financial sector and user data in order to sell it in underground marketplaces, some...

corporate-blueliv
Blueliv Cyber Threat Map

on

April 21, 2015

We are pleased to announce that we have just launched an interactive Cyber Threat Map which shows in real time the geolocation of cybercrime servers that are actively engaged...

Blueliv-will-be-at-Securmatica-next-week
Blueliv will be at Securmatica next week

on

April 15, 2015

As the previous years, Blueliv will be participating at Securmatica next week. The security congress will take place from April 21st to 23rd in Madrid and will focus on innovation...

corporate-blueliv
Visit Blueliv at RSA booth #321

on

April 13, 2015

Stop by the Blueliv booth #321 at the annual RSA security conference to see how our Targeted Cyber Threat Intelligence Platform can turn global threats into predictive, actionable intelligence...

Main-PoS-infection-techniques
Main PoS infection techniques and how to avoid them

on

April 9, 2015

Stealing payment card data has become an everyday crime that yields quick monetary gains. The goal is to steal the data stored on the magnetic stripe of payment cards,...

industry-blog
How could UBER accounts have been compromised?

on

April 6, 2015

Uber is an American company that develops and operates a mobile application that allows users to provide and employ transporting services for people. Motherboard reported last week that thousands...

industry-blog
How to avoid a Dridex infection?

on

March 25, 2015

In the recent days we have been seeing a lot of commotion around the botnet Dridex. This improved version of Dridex is proliferating thanks to an effective phishing campaign....

corporate-blueliv
We will be at Sthack 2015

on

March 24, 2015

This Friday, March 27th, the security conference created in 2011 by the Ingesup Computer Security club Sthack will take place in Bordeaux. Blueliv will be there and Ramon Vicens, Threat...

research-blog
The Equation Group: a new degree of sophistication in APT attacks

on

March 12, 2015

The Equation Group, what do we know so far? The topic of APT’s and state sponsored espionage has been back the news over the last few weeks. Based in...

corporate-blueliv
Blueliv will be at Rooted CON 2015

on

March 2, 2015

This week a new edition of the security conference Rooted CON will take place in Madrid, March 5 – 7. There, our CEO Daniel Solis will be participating at...

We-will-be-at-4YFN-Mobile-World-Congress
We will be at 4YFN – Mobile World Congress

on

February 27, 2015

Over the course of four days, 2-5 March 2015, Mobile World Capital Barcelona will host the world’s greatest mobile event: Mobile World Congress.  We are proud to participate in...

corporate-blueliv
Tomorrow Blueliv will be at Detect & Defend

on

February 11, 2015

Tomorrow we will be participating in Detect and Defend 2015, a security congress organized by IT Cube that will take place in Fürstenfeldbruck, Germany. 200 attendants are expected and...

corporate-blueliv
Blueliv will be at RSA 2015

on

February 10, 2015

We are pleased to announce that Blueliv will be participating in the RSA Conference 2015. The conference will be hold in San Francisco April 20-24. The RSA conference is...

corporate-blueliv
We have moved to our new office in Barcelona!

on

February 2, 2015

After some days surrounded by boxes and other unimaginable items that we didn’t even know we had, at last we can inform that we have moved to our new...

corporate-blueliv
We are pleased to share our new website with you!

on

January 21, 2015

We are pleased to announce that our new website is live and ready for the world to view. With simplicity, ease of use, and accessibility in mind, we have...

industry-blog
Actionable Approach to Fighting Cybercrime using Cyber Threat Intelligence

on

January 13, 2015

Cyber Defense Magazine has recently published the following article of Dennis Lee, Territory Manager North America at Blueliv. Organizations are finding themselves in a world where having defensive controls like a firewall,...

industry-blog
Botconf 2014 – Day 3

on

December 9, 2014

This third and last day of this great experience started with an awesome speech from Hendrik Adrian and Dhia Mahjoub about Fast Flux Proxy Networks, which is a DNS...

industry-blog
Botconf 2014 – Day 2

on

December 5, 2014

Today it’s been a long day with many interesting speeches, starting with a technical workshop on how to debug rootkits with windbg, and ending with a great research work,...

industry-blog
Botconf 2014 – Day 1

on

December 4, 2014

Lot of things to talk about in just one day at Botconf conference in Nancy, France. Great talks and amazing people, let’s do a short summary of some of...

research-blog
Blueliv Cyber Threat Intelligence Report. Q3 2014

on

November 26, 2014

Here you are the main conclusions of the just analyzed cyber threats that have been apparent on a global level during the third quarter of 2014, comparing them with the...

corporate-blueliv
VirusTotal’s Alliance with Blueliv Helps the Community to Improve Cyber Threat Protection

on

November 18, 2014

VirusTotal has now entered into an alliance with Blueliv that will allow both companies share cyber intelligence knowledge to protect their users and clients against new cyber threats. VirusTotal is a...

corporate-blueliv
Interview: EU Cyber firm eyes UK, US, Latam Expansion

on

November 5, 2014

The online daily news and data service Global Security Finance, has recently published the following interview to Nahim Fazal, Head of Cyber Security Development at Blueliv. Blueliv is fuelling its international...

research-blog
Measuring the impact of Shellshock in the threat intelligence landscape

on

October 27, 2014

Once high profile vulnerability is released to the public, there are a lot of people who will use the opportunity to take advantage on vulnerable machines, even if it is...

corporate-blueliv
Blueliv participates in the everisDigital Pitch2Market

on

October 21, 2014

Blueliv has been selected by Everis (an NTT Data Company) as one of the 10 companies to pitch to a selected group of companies both in Barcelona and Madrid....

Demo Free Trial Community