GDPR-Accelerate-your-reaction-time GDPR: Accelerate your reaction time, reduce your penalty

November 13, 2017

artificial-intelligence Research from Blueliv honored at Artificial Intelligence & Machine Learning conference

November 3, 2017

research-blog Making the headlines: Bad Rabbit and Reaper malware

October 27, 2017

research-blog TrickBot banking trojan using EFLAGS as an anti-hook technique

October 6, 2017

sonic-drive-in-credit-card-theft-detection-use-case Sonic Drive-In | Credit Card Theft Detection Use Case

October 5, 2017

Avoid-being-the-next-Equifax Data Breach | Avoid being the next Equifax

September 19, 2017

security-posture 4 Strategies to bolster your 2017 security posture

September 1, 2017

avoid-toxic-rogue-mobile-apps Threat intelligence to help you avoid toxic rogue mobile apps

August 23, 2017

brand-abuse 10 things you need to know about brand abuse and how to stay alerted to them

August 11, 2017

Man-in-the-browser How banks can protect customers from “Man in the browser attacks”

August 4, 2017

Targeted-malware-detection Targeted Malware Detection

July 27, 2017

leaked-data Avoid the cost and headache of leaked data (here’s how)

July 20, 2017

colors-of-cybersquatting The many colors of cybersquatting – Do not underestimate them

July 7, 2017

ruthless-cybersquatters Protect your business against ruthless cybersquatters

July 6, 2017

Petya-ransomware-2 Petya Ransomware cyber attack is spreading across the globe – Part 2

June 29, 2017

Petya-ransomware-1 Petya Ransomware cyber attack is spreading across the globe – Part 1

June 27, 2017

phishing Business threat intelligence | Win the fight against phishing attacks

June 21, 2017

MRTI-Feed Cyber Threat Intelligence Feeds | Secure your network before an attack

May 24, 2017

honeypots-wannacry What our honeypots taught us about Wannacry ransomware

May 23, 2017

wannacrypt-analysis2 WannaCrypt Malware Analysis

May 15, 2017

credit-card-theft1 The real cost of credit card theft and how to protect your assets

May 11, 2017

botnets Peeling back the layers surrounding zombie computer botnets

May 3, 2017

Deep-dive-into-the-dark-web Deep dive into the Dark Web

April 11, 2017

Mirai_code_2 Mirai: the people’s botnet

November 14, 2016

ransomware Ransomware – an up-to-date overview

November 9, 2016

ransomware From Barcelona to London: Blueliv at RANT! Risk and Network Threat forum

September 30, 2016

Vawtrak Vawtrak v2: The next big banking Trojan

September 20, 2016

Vawtrak Vawtrak banking Trojan: a threat to the banking ecosystem

August 19, 2016

Ransomware chronology Ransomware – How to defend yourself against it

August 3, 2016

Inside-Tinba-Infection-Stage-2 Inside Tinba Infection: Stage 2

July 22, 2016

Cyber-Attacks-Targeting-SWIFT Cyber Attacks Targeting SWIFT – Recap

July 13, 2016

Inside-Tinba-DGA-Infection-Stage-1 Inside Tinba-DGA Infection: Stage 1

June 7, 2016

Malware-grabbers-and-their-behavior Malware grabbers and their behavior

April 8, 2016

Antihooking-techniques-used-by-Andromeda-aim-to-defeat-Cuckoo-like-sandboxes Antihooking techniques used by Andromeda aim to defeat Cuckoo-like sandboxes

March 1, 2016

research-blog Tracking the footprints of PushDo Trojan

February 1, 2016

Blueliv-Releases-Q3-2015-Global-Cyber-Threat-Report Blueliv Releases Q3 2015 Global Cyber Threat Report

November 10, 2015

Revisiting-the-latest-version-of-Andromeda-Gamarue-Malware1 Revisiting the latest version of Andromeda/Gamarue Malware

November 5, 2015

Dridex-reloaded Dridex reloaded?

October 27, 2015

Introduction-to-honeypots Introduction to honeypots

September 29, 2015

Blueliv-Releases-Q2-2015-Global-Cyber-Threat-Report Blueliv Releases Q2 2015 Global Cyber Threat Report

August 6, 2015

research-blog Blueliv discovers the Alina variant – Joker

August 4, 2015

Introduction-to-Android-Malware Introduction to Android Malware

July 9, 2015

research-blog Webinar. Chasing the Cyber Crime: network insights of Dyre and Dridex Trojan Bankers.

June 29, 2015

research-blog Introduction to Blueliv’s API, part1

June 16, 2015

research-blog Performing automated Yara Q&A with Cuckoo

May 21, 2015

Blueliv-Releases-Q1-2015-Global-Cyber-Threat-Report Blueliv Releases Q1 2015 Global Cyber Threat Report

May 13, 2015

research-blog Ciberamenazas emergentes. A qué nos enfrentamos y cómo lo combatimos

April 30, 2015

Blueliv-Releases-Q1-2015-Global-Cyber-Threat-Report Chasing cybercrime: network insights of Dyre and Dridex Trojan bankers. (Report)

April 22, 2015

Main-PoS-infection-techniques Main PoS infection techniques and how to avoid them

April 9, 2015

research-blog The Equation Group: a new degree of sophistication in APT attacks

March 12, 2015

research-blog Blueliv Cyber Threat Intelligence Report. Q3 2014

November 26, 2014

research-blog Measuring the impact of Shellshock in the threat intelligence landscape

October 27, 2014

research-blog Defining the key elements of a cybersecurity strategy

September 18, 2014

research-blog The week of Russian leaks

September 12, 2014

research-blog Cyber Threats keep growing. Blueliv’s Cyber Threat Intelligence Report.

August 12, 2014

research-blog My Little Pony

May 29, 2014

research-blog Origin of the infections and attacks during the first quarter of 2014

May 8, 2014

research-blog Behind Point of Sale (PoS) attacks

April 24, 2014

research-blog AppCloud and the uprising SaaS Android trojan malware

April 9, 2014

research-blog First million credit cards details released

April 3, 2014

research-blog Uncovering the new modus operandi behind POS infections

April 1, 2014

research-blog Analysis of banking Korean Trojan threat

February 26, 2014

research-blog mount.cifs arbitary file identification 0day

April 25, 2012

research-blog Proxy multi-protocolo sha0proxy v2

March 7, 2012

research-blog Respuesta a Incidentes: Analizando un mailer desde la memoria

December 22, 2010

research-blog Resconstruyendo datos mediante el ingenio – Análisis forense en dispositivos móviles (II)

September 22, 2010

research-blog Análisis Forense de una Infección – PARTE III

September 14, 2010

research-blog Detección de vulnerabilidades en servicios de red mediante fuzzing – Parte I

September 9, 2010

research-blog Análisis Forense de una Infección por Malware – PARTE II

September 6, 2010

research-blog Adquisición remota con Ad|Quiere

September 1, 2010

research-blog Análisis Forense de una Infección por Malware – PARTE I

August 31, 2010

research-blog Cómo evadir las restricciones de seguridad establecidas en un kiosko

August 14, 2010

research-blog Análisis forense en dispositivos móviles (I)

August 9, 2010

research-blog Nmap Querier (NQu)

June 19, 2010

research-blog Meterpreter Cheat Sheet

June 15, 2010

research-blog Seguridad en entornos Lotus Domino

June 4, 2010

research-blog Recuperando correos electrónicos de archivos PST

May 26, 2010

research-blog Solución al reto forense #5 de Sans

May 15, 2010

research-blog Reconstrucción de sucesos mediante múltiples fuentes de evidencias digitales

May 12, 2010

research-blog La Clasificación de Vulnerabilidades bien entendida

May 6, 2010

research-blog Sobre adquisiciones forenses y copia de discos duros

April 29, 2010

research-blog Reduciendo falsos positivos en las búsquedas de strings

April 15, 2010

research-blog Volcando bases de datos mediante el uso de SQL Injection

April 13, 2010

research-blog Desenmascarando una botnet mediante el uso de criptoanálisis

April 7, 2010

research-blog Cuando la ToIP se queda sin voz

April 5, 2010

research-blog Nuevos vectores de ataque vinculados al negocio

March 31, 2010

Community Support Demo