Blog

The Blueliv blog is home to the latest threat intelligence analysis, content from investigations, corporate news, information about our modular cyberthreat intelligence solutions, and more. Take some time to explore the archives and perspectives from our intelligence analysts and management team.

Combatting password re-use
A recent article on The Register discussed an academic paper proposing that high-profile websites cooperate to stop users re-using passwords. If sites like Twitter and Facebook share users’ credentials, it suggests, they can then work together to make sure users don’t use the same password across different sites. The...
industry-blog
Threat Exchange Network blog: April 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in order to improve resilience and accelerate incident response. Members can create your own intelligence feed for free by...
Introducing Threat Context: our newest deep defense tool for richer investigations
Today we release a brand new module to help cybersecurity teams improve their productivity. Threat Context provides contextualized, qualified threat indicator information, enhancing incident triage, post-incident forensics and red teaming activities. SOC, Incident Response and Threat Intelligence teams are plagued by information overload, making it difficult to prioritize threats...
Blueliv RSA 2018
Recap: Blueliv at RSA Conference 2018
Last week, RSA Conference 2018 pulled 45,000 attendees from all over the world to San Francisco’s Moscone Centre. The week was packed with keynotes from tech luminaries, networking events and sessions discussing the latest themes, threats and solutions from the world of cybersecurity. RSA is always a great barometer...
research-blog
Drupalgeddon2 (SA-CORE-2018-002 / CVE-2018-7600) – an analysis of payloads observed in the wild 
A few weeks ago a highly critical Drupal vulnerability dubbed as Drupalgeddon2 (SA-CORE-2018-002 / CVE-2018-7600) was discovered and patched by Drupal developers. This security problem permits remote code execution (RCE) without user authentication and affects the Drupal core of versions 7, 8 and the unmaintained 6 too. Aside from...
industry-blog
Threat Exchange Network blog: March 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in order to improve resilience and accelerate incident response. Members can create your own intelligence feed for free by...
industry-blog
Blueliv Annual Cyberthreat Report advises increased intelligence sharing and cross-industry collaboration
Malware advances no longer focused on ‘traditional’ enterprise targets as cybercriminals expand their scope Today we release our Annual Cyberthreat Report, compiling actionable intelligence from Threat Compass with expert insight from our analyst team. We conclude that a higher level of collaboration and intelligence-sharing between industries is ever-more crucial...
industry-blog
Threat Exchange Network blog: February 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in order to improve resilience and accelerate incident response. Members can create your own intelligence feed for free by...
corporate-blueliv
Blueliv secures €4 million Series A funding, strengthens leadership team to accelerate global expansion
Vento’s investment boost accompanied by senior hire and growth into new Barcelona headquarters 14 February 2018 – Barcelona, Spain – Blueliv, Europe’s leading provider of enterprise-class cyberthreat intelligence solutions, today announced it has raised €4 million in Series A funding, made a senior appointment and relocated its Barcelona headquarters...
industry-blog
Threat Exchange Network blog: January 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in order to improve resilience and accelerate incident response. Members can create your own intelligence feed for free by...
corporate-blueliv
Blueliv Partner Program opens up our modular cyberthreat intelligence tools to the channel
Multi-market Strategic Partnership Program is designed to drive higher margins and accelerate partner revenue and growth Today we launch our Strategic Partnership Program, featuring deal registration incentives, dedicated sales and marketing support, and flexible engagement so partners can develop a model to suit their business. The Strategic Partnership Program...
GDPR-Accelerate-your-reaction-time
GDPR: Accelerate your reaction time, reduce your penalty
New whitepaper shows how threat intelligence can help mitigate the impact of GDPR on your business The new European Union General Data Protection Regulation (GDPR) is coming into force soon, and personal data breaches will be among the most seriously penalized issues a company can face. In fact, an organization in breach of GDPR...
artificial-intelligence
Research from Blueliv honored at Artificial Intelligence & Machine Learning conference
Blueliv recently participated in the 20th International Conference of the Catalan Association for Artificial Intelligence (Congrés Català en Intel·ligència Artificial or CCIA), whose objective is to foster discussion among the local Artificial Intelligence & Machine Learning research community. Blueliv’s Daniel Gibert presented a poster of his collaborative work on...
research-blog
Making the headlines: Bad Rabbit and Reaper malware
Though we process thousands of malware samples per day, very few of them attract the attention of the mainstream media in the way that Bad Rabbit and Reaper have recently. Here’s a quick overview, their potential impact on business and some suggested mitigation techniques to help you and your...
research-blog
TrickBot banking trojan using EFLAGS as an anti-hook technique
In one of our analysis of the TrickBot banking trojan, we found an interesting anti-sandbox that catches (almost) all user-mode (ring3) sandboxes, and we would like to share it with you. hash: 2ebeef906142f328168e7e62e8be7fbaee48e3521853d76ea778005ada6e938a The sample does something like this: lea eax, ; 1. prepare buffer for GetSystemTime push...
sonic-drive-in-credit-card-theft-detection-use-case
Sonic Drive-In | Credit Card Theft Detection Use Case
Photo courtesy Sonic Franchises On September 26, 2017, Sonic the U.S. fast-food chain based in Oklahoma City, OK, with about 3,600 locations across 45 states, acknowledged that their payment processor detected some unusual activity. “The first hints of a breach at the Oklahoma City-based fast-food chain came last...
Avoid-being-the-next-Equifax
Data Breach | Avoid being the next Equifax
Image Courtesy CNN Money On 29 July 2017, Equifax, one of the big-three credit reporting companies, announced the discovery of a data breach exposing an estimated 143M Americans. Unauthorized access took place between mid-May through July 2017. One source has called this a category-5 event.   Details of the...
security-posture
4 Strategies to bolster your 2017 security posture
Is your business prepared for a cyber threat? Here are some considerations to help you understand the important dynamics of your security posture strategies: End users are the number one security risk in any organization Your security strategy needs to be adaptable to a changing threat landscape BYOD, 3rd-party...
avoid-toxic-rogue-mobile-apps
Threat intelligence to help you avoid toxic rogue mobile apps
Image Courtesy BBC News How did my dad’s Uber account get hacked? Sometime around July 6, 2017, ABC News Brisbane reporter Josh Bavas, received 2 a.m. notification that someone had just accessed his Uber account in Los Angeles and shortly after, someone in Moscow. (He was in Australia.) He...
brand-abuse
10 things you need to know about brand abuse and how to stay alerted to them
Brand abuse is a big problem, and it’s getting bigger. Between 2010-2014, the EU, US, and Japanese customs authorities seized and estimated €467.5M EU / $953.2M US / ¥100M JA in counterfeited products from China alone. The next 4 countries–Hong Kong, Turkey, Greece, and Panama–accounted for another third. Brand...
Man-in-the-browser
How banks can protect customers from “Man in the browser attacks”
Criminal groups use a wide range of methods to compromise users and siphon its bank accounts, for this reason, when a user’s computer is infected by a malware, depending on its main goal and its capabilities, it could use multiple methods to obtain sensitive information, such as changing the...
Targeted-malware-detection
Targeted Malware Detection
Today’s cyber criminal wants one thing. He wants to get his malware into your IT network because once he’s in, he can go to work–remotely–achieving the myriad of other criminal activities he and his accomplices have in mind. Your best defense against targeted malware is to thwart the criminal...
leaked-data
Avoid the cost and headache of leaked data (here’s how)
“Leaked data falls into 4 types,” says Peter Gordon from SANS Institute: confidential information, intellectual property, customer data and health records. Data leakage, however, is not limited to deliberate efforts of cyber espionage. In fact, a surprising amount of it tends to be the result of human error–well into...
CISO-360-Congress
Successful CISO 360 Congress sponsored by Blueliv
Last week, Pulse Conferences hosted the CISO 360 Congress at the Grand Marina hotel in Barcelona; an incomparable frame by the Mediterranean Sea where more than 80 CISOs gathered to discuss the most trendy and relevant cyber security topics. The event went on for 3 days and it gave...
colors-of-cybersquatting
The many colors of cybersquatting – Do not underestimate them
Blueliv Guest Post | Jean-Jacques Dahan, Managing Director and Expert Consultant for Online Brand Security & Global Domain Strategy at Zeusmark. Cybersquatting is a constant challenge for a company. It is a broad concept involving many aspects of risk, speculation, and fraud. It should not be underestimated as it provides a...
ruthless-cybersquatters
Protect your business against ruthless cybersquatters
Also this week: Blueliv is pleased to announce a featured post on the subject of Cybersquatting from Jean-Jacques Dahan–Managing Director and Expert Consultant for Online Brand Security & Global Domain Strategy, Zeusmark. This article continues the discussion begun with the Phishing module article. Now, the focus will be on...
Petya-ransomware-2
Petya Ransomware cyber attack is spreading across the globe – Part 2
Following our first blog providing an early analysis about Petya, we are sharing further findings of the malware analysis that we have performed. We divided this post into the three areas we have briefly analyzed after the Petya attack: the propagation techniques of the malware, the encryption techniques used,...
Petya-ransomware-1
Petya Ransomware cyber attack is spreading across the globe – Part 1
As you might know, Petya Ransomware is currently devastating Airlines, Banks & Utilities and many other businesses across the globe. Denmark, France, Spain, Ukraine, and the USA are already impacted and many others might be too in the coming hours. So far, it seems that the sample is being...
phishing
Business threat intelligence | Win the fight against phishing attacks
Blueliv has one module that handles two of the main cyber threats targeted at businesses–Phishing and Cybersquatting. This module plugs into our threat monitoring Enterprise Platform Solution. For completeness, we’ll divide these threats into separate articles. First, it’s important to understand the inherent nature of these attacks. Criminals who...
Infosec
Blueliv at Infosecurity Europe 2017
This year, we had the opportunity to exhibit in this year’s edition of Infosecurity Europe (Infosec) in London, Europe’s largest and most comprehensive Information Security event, which welcomed more than 13,500 visitors including industry’s thought leaders and experts.   Threat Intelligence high in the Agenda The 22nd edition took...
threat-exchange
Blueliv Threat Exchange Network | A community of early cyber responders
Cybercrime has become a socialized industry, and as such criminals employ community knowledge and resources found on the dark web and deep web to intensify efforts. In 2016, Europol identified some startling trends that demonstrate how sophisticated cyber criminals have become. Here are some top specialties and readily available...
MRTI-Feed
Cyber Threat Intelligence Feeds | Secure your network before an attack
Which malicious malware attack does your boss need you to block today? Blueliv Cyber Threat Intelligence Feeds provide security information that’s granular, industry specific and on time. Experts from respected think tanks like Gartner and RSA agree. Knowledge-based information and targeted action are having a profoundly positive effect on...
honeypots-wannacry
What our honeypots taught us about Wannacry ransomware
WannaCry has been on the lips, and especially in the concerns of everyone these last days. As we have addressed in recent posts, Friday, 12th May, marked the beginning of a massive global campaign to spread the WannaCry ransomware (a.k.a. WCry, WannaCrypt, WCrypt, WannaCrypt0r…). The ransomware spreads through a...
wannacrypt-analysis2
WannaCrypt Malware Analysis
Last Friday, 12th May, a worm targeting outdated Windows machines was detected. The worm in question used leaked NSA exploits to propagate and dropped a variant of a ransomware called WannaCrypt. This post will try to give you an insight into the infection process, as well as the spreading...
wannacry
Wannacry Ransomware used to spread global cyber attacks
A global ransomware attack began impacting companies and hospitals across the United States, Europe, and Asia early Friday morning. Companies in more than 70 countries have reported incidents as of Friday afternoon. Computers all over the world are being locked down by a ransomware called Wannacry/Wanna/Wcry. The British government...
wannacry2
El ransomware ataca contundentemente el IBEX-35
Este viernes ha saltado la noticia de que el ransomware “WannaCry” se ha colado en los sistemas informáticos de algunas de las empresas del IBEX-35 aprovechando una vulnerabilidad de los sistemas Windows. El Gobierno británico por su parte, ha anunciado que un ataque mediante virus bitcoin ha afectado a...
credit-card-theft1
The real cost of credit card theft and how to protect your assets
Sometime in mid-February 2017, anti-fraud teams from multiple financial institutions contacted KrebsOnSecurity for help tracing the source of a credit card fraud happening in high-end restaurants around the U.S. Investigations revealed a vast majority of patrons with compromised cards dined in locations run by Select Restaurants, Inc., a management...
botnets
Peeling back the layers surrounding zombie computer botnets
What is a Botnet? To understand a botnet, you first must begin with a bot. A bot is an automated malware program or roBOT that takes control of a computerized device. That single, infected computer, or connected device, joins a larger roBOT NETwork–or BOTNET. Once hijacked, these devices transform...
corporate-blueliv
Blueliv en Securmática: La ciberseguridad aterriza en la alta dirección
Una vez más, Blueliv participará y patrocinará el congreso global de ciberseguridad, seguridad de la información y privacidad, Securmática. El congreso se llevará a cabo del 25 al 27 de abril en Madrid, y este año tendrá el objetivo de brindar una visión actualizada de cómo se está transformando...
Deep-dive-into-the-dark-web
What is the Dark Web?
Deep dive into the Dark Web The Dark Web a part of the World Wide Web made up of a variety of anonymous networks, untraceable online activity and non-referenced URLs and domains. It is only through software that enables users to browse these networks anonymously. The most common network...
315-platform-release
Platform Release 3.15: detect cybersquatting threats faster
Our latest platform release (3.15) features an amazing update in the Phishing & Cybersquatting module, giving you the ability to detect a wider variety of cybersquatting threats in a more efficient manner, making your life easier. Cybersquatting cases hit record level Cybersquatting is when a website domain is registered...
Rooted-con
Blueliv sponsors RootedCON 2017
  This year we once again sponsored RootedCON, Madrid’s annual computer security conference. Our Professional Services team shared their highlights in this blog post. Security professionals from all over the world attended to represent some of the most influential organizations in the cyber security sector. And it wasn’t only...
cyber-threat-intel-platform
Try the Blueliv Cyber Threat Intelligence Platform for free
  Do you want to improve your external threat visibility? The Blueliv Cyber Threat Intelligence Platform 14-day free trial is now available. During your trial Blueliv will look for compromised information belonging to your company (based on the domain of the email you used to register). Use the Blueliv...
rsa-usa-2017
RSA Conference USA 2017: one week on
Year after year, RSA continues to hold the title as the biggest annual IT security event. This year marked Blueliv’s third year of attendance at the renowned San Francisco conference to meet and connect with our industry peers. More exhibitors, more attendees The number of exhibitors increases each year...
313-platform-release
Platform release 3.13: enhanced data gathering
Our latest platform release (3.13) features three fantastic updates to increase customers’ cyber threat visibility and enable users to gather even more threat data than before. And of course, Blueliv’s Product Dev team have been busy implementing some user-interface enhancements. Here’s a little bit about what’s new. Brand mentions...
finance-sector-use-case
Cyber threat intel drives change in the finance sector
Our latest use case documents the implementation of targeted cyber threat intelligence to reduce the level of cyber risk challenging a major bank, and discusses common challenges relevant to financial institutions everywhere. Financial sector use case Industry: Financial Services Challenge: Inefficient management of multiple generic threat intelligence sources This...
privacy-aware
Data Privacy Day 2017 – be #privacyaware
Data has become the most valuable asset to brands big and small, but protecting it is increasingly difficult. It’s been estimated that there will be 30.7 billion connected devices by 2020. Personal data is the fuel that makes this cool new technology work. And with new technology, our attack...
rsa-conference-2017
Don’t miss Blueliv at RSA Conference USA 2017
DETECT AND REACT TO CYBER THREATS FASTER: advanced business threat search and monitoring “Most of the important things in the world have been accomplished by people who have kept on trying when there seemed to be no hope at all.” Dale Carnegie With the words of Dale Carnegie in...
isoc24
iSOC24 Morning Session: Cyber Threat Intelligence 24 Jan 2017
We’re pleased to share that we’ll be joining the agenda as a strategic vendor for iSOC24’s next ‘be in control’ morning session dedicated to Cyber Threat Intelligence in Culemborg, Netherlands. This event is aimed at organizations currently investigating this subject. The morning session will include iSOC24’s insights and experiences...
blueliv-proudest-moments-2016
2016 in review: Blueliv’s proudest moments
2016 has been an eventful year in every sense across the globe. Before we take a well-deserved break over the holidays and prepare ourselves for an even busier 2017, let’s take a look back at seven key milestones Blueliv has accomplished this year. We’d like to wish our customers...
corporate-blueliv
Why Vawtrak v2 could be the next major banking Trojan
Neira Jones, Non-Executive Director Cognosec, Partner Global Cyber Alliance and industry influencer shares her thoughts on the evolution of banking Trojans and digital transformation in the finance sector in our new white paper. Think more like a criminal… This came to my attention through the excellent report published by cyber...
computer-security-day-2016
Computer Security Day 2016: Make a date with our malware sandbox
Today marks Computer Security Day 2016. Our responsibility to ensure the security of our networks and connected devices is ‘always on’ in an age when we are heavily dependent on being online just to function normally. But, it’s always good to pause and remind ourselves about how important it...
corporate-blueliv
Blueliv Invites Soltra Edge Users to Join Free Intelligence Sharing Platform
Blueliv Threat Exchange Network reassured by recent acquisition of Soltra Edge in continued effort to encourage collaboration and intelligence sharing in cyber security industry. BARCELONA, Spain – Nov. 28, 2016 – PRLog — Blueliv, a leading provider of cyber threat intelligence, today broadcast the availability of the Blueliv Threat Exchange Network, a free intelligence...
corporate-blueliv
Blueliv in Gartner’s Hype Cycle for Infrastructure Protection 2016
In 2016, the threat level to enterprise IT continues to be at very high levels, with daily accounts in the press of large breaches and attacks. No single safeguard will protect your organization against all possible attacks, hence, difficult investment choices must be made to select the right mix...
industry-blog
Don’t end up in the dark this Black Friday
Don’t end up in the dark this Black Friday! Online sales in the US are predicted to increase by over 13% this Black Friday vs. 2015, surpassing $3billion. Is your IT infrastructure up to the challenge ?   Recently we’ve been blogging about the importance of a resilient network...
Demo Free Trial Community Newsletter