Blog

The Blueliv blog is home to the latest threat intelligence analysis, content from investigations, corporate news, information about our modular cyberthreat intelligence solutions, and more. Take some time to explore the archives and perspectives from our intelligence analysts and management team.

corporate-blueliv
Blueliv to attend SC Congress NY 2014

on

October 20, 2014

We are excited to share that Blueliv’s US Sales Manager, Dennis Lee will be attending SC Magazine’s Congress 2014 tomorrow in New York City. Aside from being our Sales manager,...

industry-blog
People becoming unfazed to cyber attacks?

on

October 15, 2014

When Target was hacked last year the incident made headline news for months. Target reported that their Q4 sales dropped 46% and their stock took an 11% dip. Most...

industry-blog
Cyber-attack against JPMorgan Chase

on

October 9, 2014

A cyber-attack targeting JPMorgan Chase this summer compromised over 75 million household according to a statement recently released by Chase Bank. The data stolen included names, addresses and email...

corporate-blueliv
Welcome to our new brand design

on

October 9, 2014

Today Blueliv launches a new corporate identity complemented by a new logo and graphical profile. By doing this we are aligning our business goals with our ambition to be...

corporate-blueliv
Blueliv is attending the IT-SA Congress

on

October 7, 2014

These days part of Blueliv’s team will be attending the IT-SA security congress in Nuremberg. The congress lasts three days in which we expect to attend interesting keynotes and...

research-blog
Defining the key elements of a cybersecurity strategy

on

September 18, 2014

There is not a day that goes by without some startling revelation about a new threat from emerging from the world of Cyber-Crime. Over the last few months there...

corporate-blueliv
Blueliv attended the Gartner Security and Risk Summit in London

on

September 15, 2014

The Gartner Security and Risk Summit was held over two days, with over 150 leading blue chip companies in attendance. The hot topics for the event was topped by...

research-blog
The week of Russian leaks

on

September 12, 2014

This week some important leaks have arisen in on the Internet, all of them related to Russian users: 1.000.000 Yandex addressess and passwords. 4.500.000 Mail.ru addressess and passwords. 5.000.000...

corporate-blueliv
Gartner Security & Risk Management Summit London

on

September 8, 2014

Some weeks ago we attended the Gartner Security and Innovation Summit in Washington and now we are attending the event in London. This summit will last two days, two really...

research-blog
Cyber Threats keep growing. Blueliv’s Cyber Threat Intelligence Report.

on

August 12, 2014

Here you are the main conclusions of the just analyzed Cyber Threats which have been apparent on a global level during the second quarter of 2014, comparing them with...

corporate-blueliv
Why SMBs should also care about Data breaches?

on

July 23, 2014

A written by Jen Miller of CIO magazine describes the importance for Cyber Security for small to midsize businesses. The article highlights how many smaller businesses can suffer from...

corporate-blueliv
Blueliv at the Innovation Summit 2014

on

July 16, 2014

Tomorrow Blueliv will attend the Innovation Summit 2014, in New York City. The event is organized by SINET and connects America’s three most powerful epicenters and evangelizes the importance of...

corporate-blueliv
Affected by P.F. Chang’s Credit Card Data Breach?

on

June 18, 2014

Learn how Blueliv minimizes the consequences of Credit Card thefts. PF Chang’s is a very popular restaurant option for professionals looking to impress their customers with enjoyable Chinese food....

corporate-blueliv
El mundo ya no se controla con armas, sino con ordenadores

on

June 16, 2014

En Publico.es han entrevistado a Daniel Solís, CEO de Blueliv. Aquí tenéis un extracto y os invitamos a leer la entrevista completa en el medio.   Cada día, cada...

corporate-blueliv
Blueliv at the Gartner Security & Risk Management Summit

on

June 10, 2014

In two weeks from now, some of us will be attending the Gartner Security & Risk Management Summit in National Harbor, MD (Washington, D. C. Area).   This summit...

research-blog
My Little Pony

on

May 29, 2014

One year ago our colleague Xylit0l wrote about the Pony stealer malware. It’s been a year and the Pony family has grown! Two malwares, at least, have been found...

corporate-blueliv
The exponential cyber threat to mobile commerce

on

May 22, 2014

As m-commerce grows, recent research reveals that security is a major concern for consumers making payments by smartphone. The security threats against the mobile channel are growing; using the...

corporate-blueliv
How does Blueliv work?

on

May 16, 2014

Do you want to find out how our technology Blueliv works?   We’re going to explain you, step by step, how we hunt the Cyber Crime with Blueliv Cyber...

research-blog
Origin of the infections and attacks during the first quarter of 2014

on

May 8, 2014

Blueliv has analyzed the main Cyber Threats which have been apparent on a global level during the first quarter of 2014, and in this post we are going to...

research-blog
Behind Point of Sale (PoS) attacks

on

April 24, 2014

In this previous article we showed how cybercriminals were trying to infect PoS devices with Dexter malware through pcAnywhere service, port 5631. Now, what we want is to analyze...

corporate-blueliv
Mundo Hacker, now face to face

on

April 22, 2014

Mundo Hacker, the successful TV show of Discovery Max, Spain, is organizing the Mundo Hacker Day Congress, addressed to Cyber Security professionals.     The congress, which aims to...