Industry

The latest news and opinions relating to the wider cybersecurity ecosystem. Find analysis, practical information and advice for cybersecurity professionals of all levels, including summaries from the Blueliv Threat Exchange Network.

Cyberthreat intelligence retail
The cost of doing business: cyberthreat intelligence for retail & e-commerce
The internet has changed the way that goods and services are bought and sold. The retail and e-commerce sector continues to undergo rapid transformation as consumer expectation increases. We demand high quality experiences, products and services, on desktop and on mobile. On the back end, analytic engines, third-party integrations...
Threat Exchange Network blog: August 2019
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in order to improve resilience and accelerate incident response. Members can create their own intelligence feed for free by exporting...
Threat Exchange Network blog: July 2019
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in order to improve resilience and accelerate incident response. Members can create their own intelligence feed for free by exporting...
Evolution of Malware and Threat Actors
The world of malware and cybercrime has evolved a great deal in the last decade. The following blog post tracks this evolution, expanding on intelligence accessible through Threat Compass. The more we understand about the motivations and TTPs of threat actors, the stronger defenses we can build against cybercrime....
Data breach under GDPR: one year later
The European Union General Data Protection Regulation (GDPR) came into force on 25th May 2018. Just over a year later, European data protection regulators have reported nearly 90,000 data breach notifications so far, and notably these are only those which have been legally disclosed. Law firm DLA Piper recently suggested...
industry-blog
Threat Exchange Network blog: April 2019
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in order to improve resilience and accelerate incident response. Members can create their own intelligence feed for free by exporting...
Blueliv announces technical alliance with MrLooquer
We are excited to announce our latest technical alliance, following founders Fran Gomez and Rafa Sanchez’ presentation at this year’s RootedCon in Madrid. MrLooquer, a fellow Spanish cybersecurity company, provides valuable information to help organizations manage their risk accurately. Their technology discovers and analyses IPv4 and IPv6 assets covering...
industry-blog
Threat Exchange Network blog: March 2019
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in order to improve resilience and accelerate incident response. Members can create your own intelligence feed for free by exporting these...
Taking stock: RSA Conference 2019
Last week’s RSA Conference in San Francisco was one of the busiest ever, drawing tens of thousands of information security professionals, law enforcement and academics from around the world. RSA is always a great barometer of how the cybersecurity market is evolving at a global level, and this year...
Threat Exchange Network blog: January 2019
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in order to improve resilience and accelerate incident response. Members can create your own intelligence feed for free by...
Threat Exchange Network blog: November 2018
Our community is growing daily – become a member for free and contribute to the network. The fight against cybercrime is a collaborative effort. Here you’ll find some of the top posts from our Threat Exchange Network over the past month. Join for free today – in addition to...
Threat Exchange Network blog: July 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in order to improve resilience and accelerate incident response. Members can create their own intelligence feeds for free by exporting these...
Threat Exchange Network blog: June 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in order to improve resilience and accelerate incident response. Members can create their own intelligence feeds for free by exporting these...
Combatting password re-use
A recent article on The Register discussed an academic paper proposing that high-profile websites cooperate to stop users re-using passwords. If sites like Twitter and Facebook share users’ credentials, it suggests, they can then work together to make sure users don’t use the same password across different sites. The...
industry-blog
Threat Exchange Network blog: April 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in order to improve resilience and accelerate incident response. Members can create your own intelligence feed for free by...
industry-blog
Threat Exchange Network blog: March 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in order to improve resilience and accelerate incident response. Members can create your own intelligence feed for free by...
industry-blog
Blueliv Annual Cyberthreat Report advises increased intelligence sharing and cross-industry collaboration
Malware advances no longer focused on ‘traditional’ enterprise targets as cybercriminals expand their scope Today we release our Annual Cyberthreat Report, compiling actionable intelligence from Threat Compass with expert insight from our analyst team. We conclude that a higher level of collaboration and intelligence-sharing between industries is ever-more crucial...
industry-blog
Threat Exchange Network blog: February 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in order to improve resilience and accelerate incident response. Members can create your own intelligence feed for free by...
industry-blog
Threat Exchange Network blog: January 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in order to improve resilience and accelerate incident response. Members can create your own intelligence feed for free by...
CISO-360-Congress
Successful CISO 360 Congress sponsored by Blueliv
Last week, Pulse Conferences hosted the CISO 360 Congress at the Grand Marina hotel in Barcelona; an incomparable frame by the Mediterranean Sea where more than 80 CISOs gathered to discuss the most trendy and relevant cyber security topics. The event went on for 3 days and it gave...
Infosec
Blueliv at Infosecurity Europe 2017
This year, we had the opportunity to exhibit in this year’s edition of Infosecurity Europe (Infosec) in London, Europe’s largest and most comprehensive Information Security event, which welcomed more than 13,500 visitors including industry’s thought leaders and experts.   Threat Intelligence high in the Agenda The 22nd edition took...
wannacry
Wannacry Ransomware used to spread global cyber attacks
A global ransomware attack began impacting companies and hospitals across the United States, Europe, and Asia early Friday morning. Companies in more than 70 countries have reported incidents as of Friday afternoon. Computers all over the world are being locked down by a ransomware called Wannacry/Wanna/Wcry. The British government...
wannacry2
El ransomware ataca contundentemente el IBEX-35
Este viernes ha saltado la noticia de que el ransomware “WannaCry” se ha colado en los sistemas informáticos de algunas de las empresas del IBEX-35 aprovechando una vulnerabilidad de los sistemas Windows. El Gobierno británico por su parte, ha anunciado que un ataque mediante virus bitcoin ha afectado a...
Rooted-con
Blueliv sponsors RootedCON 2017
  This year we once again sponsored RootedCON, Madrid’s annual computer security conference. Our Professional Services team shared their highlights in this blog post. Security professionals from all over the world attended to represent some of the most influential organizations in the cyber security sector. And it wasn’t only...
finance-sector-use-case
Cyber threat intel drives change in the finance sector
Our latest use case documents the implementation of targeted cyber threat intelligence to reduce the level of cyber risk challenging a major bank, and discusses common challenges relevant to financial institutions everywhere. Financial sector use case Industry: Financial Services Challenge: Inefficient management of multiple generic threat intelligence sources This...
privacy-aware
Data Privacy Day 2017 – be #privacyaware
Data has become the most valuable asset to brands big and small, but protecting it is increasingly difficult. It’s been estimated that there will be 30.7 billion connected devices by 2020. Personal data is the fuel that makes this cool new technology work. And with new technology, our attack...
isoc24
iSOC24 Morning Session: Cyber Threat Intelligence 24 Jan 2017
We’re pleased to share that we’ll be joining the agenda as a strategic vendor for iSOC24’s next ‘be in control’ morning session dedicated to Cyber Threat Intelligence in Culemborg, Netherlands. This event is aimed at organizations currently investigating this subject. The morning session will include iSOC24’s insights and experiences...
computer-security-day-2016
Computer Security Day 2016: Make a date with our malware sandbox
Today marks Computer Security Day 2016. Our responsibility to ensure the security of our networks and connected devices is ‘always on’ in an age when we are heavily dependent on being online just to function normally. But, it’s always good to pause and remind ourselves about how important it...
industry-blog
Don’t end up in the dark this Black Friday
Don’t end up in the dark this Black Friday! Online sales in the US are predicted to increase by over 13% this Black Friday vs. 2015, surpassing $3billion. Is your IT infrastructure up to the challenge ?   Recently we’ve been blogging about the importance of a resilient network...
NCSAM-2016-Building-resilience-in-critical-systems
NCSAM 2016: Building resilience in critical systems
Connectivity is critical nowadays, and we expect a highly reliable connection wherever we are, whatever we’re doing. Our dependency on being online forms a fundamental part of our global infrastructure; without the internet, electricity supply, transport and communication would quickly come to a standstill. Protecting our networks is therefore...
industry-blog
Some tricks look like treats: using Threat Intelligence to improve your cyber threat visibility
Social engineering techniques date back to classical mythology. Social engineering can take many different forms, yet the basic concept hasn’t evolved since the Ancient Greeks deployed the Trojan horse. And as cyber security professionals, Trojan is a term we reference nearly every day. So why, in 2016, do we...
industry-blog
Our continuously connected lives: What’s your ‘apptitude’?
Recent news headlines reported one of the largest DDOS (Distributed Denial of Service) attacks to date. DNS service provider Dyn suffered multiple network outages affecting popular sites including Twitter, Github and Etsy as a result of this attack, of which we know one source of traffic was the Mirai...
industry-blog
NCSAM 2016: Recognizing and combatting cybercrime
As we mark week three of National Cyber Security Awareness Month, we’re pausing to take stock of the many different forms of online crime. At Blueliv, we’re focused on fighting the bad guys who threaten the security and net worth of organizations across all industries. But we’re very familiar...
industry-blog
From the Break Room to the Board Room: creating a culture of cyber security in the workplace – a start-up’s perspective
This October, we’re supporting National Cyber Security Awareness Month as an official champion. NCSAM is celebrated every October and marks a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online. No matter how many faces fill...
industry-blog
NCSAM 2016: The basic steps to online safety and security
Blueliv is proud to be supporting National Cyber Security Awareness Month 2016. NCSAM is celebrated every October and marks a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online. This week the NCSAM champions have one...
industry-blog
Hacking group Shadow Brokers infiltrate NSA Equation Group
Militarization of cyberspace is no longer a novelty. Instances of governments using sophisticated zero-day malware against other nations’ organizations and industry have been seen before now. This week a previously unknown group calling themselves “Shadow Brokers” claimed to have infiltrated a server belonging to Equation Group, a hacking group...
Adaptive Security Model
Possible approaches to adaptive security
Traditional approaches to integrating cyber threat intelligence into an adaptive security model have relied very heavily on utilizing open source threat intelligence feeds and integrating these into a SIEM. The thinking behind this may have well been that the crowd-sourced threat intelligence is just as good if not better...
industry-blog
No cON Name’15, Summary of the Spanish Premier Technical Security Conference
For those of you who haven’t heard about it, No cON Name is a Spanish security conference that takes place in Barcelona every year, where experts from all around Spain, and sometimes, around the world, gather to share their security-related findings. This year, we attended a number of cool keynotes...
industry-blog
Collaborative Information Exchange Models to Fight Cyber Threats
The fight against cybercrime should take on a new direction. It should utilize the collaborative models of social media also referred to as Web 2.0 technologies that allow for the socialization of the fight against cyber threats through a community or group. This is how we can overcome the...
industry-blog
Want to fight cyber threats? Start collaborating
It is universally known that no one, be it an individual or a company, can hope to find and neutralize every threat that can be found out in the wild. In cyber crime there is a tendency towards industrialization. You can find forums and marketplaces where services (such as...
Blueliv-Releases-Q2-2015-Global-Cyber-Threat-Report
Blueliv Releases Q2 2015 Global Cyber Threat Report
Through its cyber threat intelligence platform Blueliv detected and analyzed 5 million stolen credentials and credit cards, 200,000 targeted malware samples, and 500,000 crime servers between April and June 2015. THEFT OF CREDIT AND DEBIT CARD INFORMATION In the second quarter of 2015, the US has continued to be the...
industry-blog
Threat Intelligence & RSA
Cyber Defense Magazine has just published the following article of Nahim Fazal, Head of International Business Development at Blueliv. RSA 2015 was very much the year of Threat Intelligence. That is the overwhelming sensation one is left with as the dust settles on the RSA conference for this year. Perhaps more...
industry-blog
How could UBER accounts have been compromised?
Uber is an American company that develops and operates a mobile application that allows users to provide and employ transporting services for people. Motherboard reported last week that thousands of active Uber accounts are for sale in black markets located in the dark web. After investigating the issue, Uber...
industry-blog
How to avoid a Dridex infection?
In the recent days we have been seeing a lot of commotion around the botnet Dridex. This improved version of Dridex is proliferating thanks to an effective phishing campaign. Taking advantage of the proximity of the annual tax declaration, the organization behind this botnet is sending emails to unsuspecting...
industry-blog
Actionable Approach to Fighting Cybercrime using Cyber Threat Intelligence
Cyber Defense Magazine has recently published the following article of Dennis Lee, Territory Manager North America at Blueliv. Organizations are finding themselves in a world where having defensive controls like a firewall, secure datacenter and stringent security policies is simply not enough. In 2014, we’ve seen companies like JP Morgan Chase, Sony...
industry-blog
Botconf 2014 – Day 3
This third and last day of this great experience started with an awesome speech from Hendrik Adrian and Dhia Mahjoub about Fast Flux Proxy Networks, which is a DNS technique used by botnets in which multiple ever-changing IPs are associated with a unique DNS name. These IPs are swapped...
industry-blog
Botconf 2014 – Day 2
Today it’s been a long day with many interesting speeches, starting with a technical workshop on how to debug rootkits with windbg, and ending with a great research work, done by Tom Ueltschi, on ponmocup malware and Zuponcic infection Kit. Meanwhile, during the day we’ve seen a variety of...
industry-blog
Botconf 2014 – Day 1
Lot of things to talk about in just one day at Botconf conference in Nancy, France. Great talks and amazing people, let’s do a short summary of some of them. The conference started with a very interesting presentation from National Crime Agency (NCA) about Botnet takedowns, in which the...
industry-blog
People becoming unfazed to cyber attacks?
When Target was hacked last year the incident made headline news for months. Target reported that their Q4 sales dropped 46% and their stock took an 11% dip. Most recently Home Depot was hacked exposing over 65 Million Credit cards, including yours truly. However, Home Depot stock didn’t take...
industry-blog
Cyber-attack against JPMorgan Chase
A cyber-attack targeting JPMorgan Chase this summer compromised over 75 million household according to a statement recently released by Chase Bank. The data stolen included names, addresses and email addresses, but did not include any credentials or bank account numbers. This attack compromised resources such as Chase.com, JPMorganOnline and...
Demo Free Trial Community Newsletter