Blog

The Blueliv blog is home to the latest threat intelligence analysis, content from investigations, corporate news, information about our modular cyberthreat intelligence solutions, and more. Take some time to explore the archives and perspectives from our intelligence analysts and management team.

corporate-blueliv
Platform release 3.11: making customers’ lives easier
The Product Dev team here at Blueliv is all about delivering continuous improvement to create a top-notch user experience. The latest Blueliv Threat Intelligence Platform release 3.11 includes five key updates designed to make life a little easier for customers. Extra security has been built into two-factor authentication to...
Mirai_code_2
Mirai: the people’s botnet
Mirai-botnet, the infamous IoT botnet, has struck again, and this time it almost took down an entire country; Liberia. Mirai botnet is a botnet that attempts to infect Internet of Things (IoT) devices to perform DDoS attacks, and was recently used to perform the largest DDoS attack ever which...
ransomware
Ransomware – an up-to-date overview
Overview The Blueliv Threat Intel Research Labs team has recently analyzed a large amount of ransomware samples to obtain a global overview on the status quo of this malware family. We’re sharing our conclusions here. Think before you pay We’ve found that in some cases, ransomware encrypts your data...
NCSAM-2016-Building-resilience-in-critical-systems
NCSAM 2016: Building resilience in critical systems
Connectivity is critical nowadays, and we expect a highly reliable connection wherever we are, whatever we’re doing. Our dependency on being online forms a fundamental part of our global infrastructure; without the internet, electricity supply, transport and communication would quickly come to a standstill. Protecting our networks is therefore...
industry-blog
Some tricks look like treats: using Threat Intelligence to improve your cyber threat visibility
Social engineering techniques date back to classical mythology. Social engineering can take many different forms, yet the basic concept hasn’t evolved since the Ancient Greeks deployed the Trojan horse. And as cyber security professionals, Trojan is a term we reference nearly every day. So why, in 2016, do we...
industry-blog
Our continuously connected lives: What’s your ‘apptitude’?
Recent news headlines reported one of the largest DDOS (Distributed Denial of Service) attacks to date. DNS service provider Dyn suffered multiple network outages affecting popular sites including Twitter, Github and Etsy as a result of this attack, of which we know one source of traffic was the Mirai...
industry-blog
NCSAM 2016: Recognizing and combatting cybercrime
As we mark week three of National Cyber Security Awareness Month, we’re pausing to take stock of the many different forms of online crime. At Blueliv, we’re focused on fighting the bad guys who threaten the security and net worth of organizations across all industries. But we’re very familiar...
industry-blog
From the Break Room to the Board Room: creating a culture of cyber security in the workplace – a start-up’s perspective
This October, we’re supporting National Cyber Security Awareness Month as an official champion. NCSAM is celebrated every October and marks a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online. No matter how many faces fill...
industry-blog
NCSAM 2016: The basic steps to online safety and security
Blueliv is proud to be supporting National Cyber Security Awareness Month 2016. NCSAM is celebrated every October and marks a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online. This week the NCSAM champions have one...
ransomware
From Barcelona to London: Blueliv at RANT! Risk and Network Threat forum
This week Blueliv sponsored its first RANT forum event at The Counting House in London to share the findings from the recent technical investigation into banking Trojan Vawtrak v2. Ramon Vicens, VP of Threat Intelligence Research Labs, talked through the analysis and was met with lively debate from the...
310-platform-release
3.10 Platform Release: Faster and smarter incident management
We’re pleased to announce the latest release of the Blueliv Cyber Threat Intelligence Platform. Release 3.10 brings you a number of functional improvements and new automated features to improve the efficiency of your SOC team and simplify the task of analysing and responding to threats. Here are a few...
Vawtrak
Vawtrak v2: The next big banking Trojan
This month Blueliv Threat Intelligence Research Labs team has published an exclusive report revealing the most complete picture of Vawtrak v2 malware seen to date. Vawtrak is a serious threat to the finance sector and is predicted to be the next major banking Trojan. Chasing cybercrime: Network insights into...
corporate-blueliv
Gartner includes Blueliv in “Innovation Insight for MRTI” 2016 report
We’re pleased that Blueliv has been mentioned in the Gartner 2016 “Innovation Insight for Machine Readable Threat Intelligence (MRTI)” report as one of the: “Example Providers of Commercial Threat Intelligence Feeds You Can Acquire” and “Example Vendors That Help You Aggregate Threat Intelligence” The report, written by cyber security analysts Craig...
corporate-blueliv
Blueliv sponsors and attends CyberSecurity MeetUp, Helsinki
Blueliv was a proud sponsor of the recent CyberSecurity MeetUp held at Microsoft in Helsinki on 31 August 2016. Our very own Ramon Vicens, Research Labs VP, took part in the agenda to showcase the Blueliv Threat Exchange Network and share insight on innovation, social communities and sharing intelligence...
Vawtrak
Vawtrak banking Trojan: a threat to the banking ecosystem
Today marks the start of c0c0n International Cyber Security and Policing Conference 2016 where our Labs Research expert, Raashid Bhat, will be sharing insight into the threats posed by the Vawtrak Trojan, one of the most prevalent banking Trojans around today. It promises to be an unmissable session based...
industry-blog
Hacking group Shadow Brokers infiltrate NSA Equation Group
Militarization of cyberspace is no longer a novelty. Instances of governments using sophisticated zero-day malware against other nations’ organizations and industry have been seen before now. This week a previously unknown group calling themselves “Shadow Brokers” claimed to have infiltrated a server belonging to Equation Group, a hacking group...
threat-exchange-network
New Release of Blueliv Threat Exchange Network
Cyber-criminals are very well organised and typically operate as part of highly sophisticated and specialised criminal organizations. Needless to say, in terms of the skills and methods used they are often years ahead of the businesses and establishments they target. In response, companies are increasingly hiring cyber security specialists,...
Ransomware chronology
Ransomware – How to defend yourself against it
What is Ransomware? Ransomware is a type of malware that has lately been increasingly in use by the cyber criminals. In order to profit from the distribution of Ransomware, the bad guys have been targeting numerous businesses and large organizations around the world. In essence, the Ransomware malware is...
National-Cyber-Security-Awareness-Month-2016-Champion
Blueliv Becomes the “National Cyber Security Awareness Month 2016” Champion
We are happy to announce that Blueliv is supporting the National Cyber Security Awareness Month (NCSAM) 2016. NCSAM was created as a collaborative effort between government and industry to ensure all digital citizens have the resources needed to stay safer and more secure online while also protecting their personal...
309-platform-release
Version 3.9 Platform Release feat. NEWS
While you guys have been fine-tuning your cyber defence strategies and finding ways to further improve your overall security postures, we have been busy making improvements to our Threat Intelligence Management Platform. As always, our clients have been really helpful and awesome by providing us with valuable feedback, and...
Inside-Tinba-Infection-Stage-2
Inside Tinba Infection: Stage 2
This is a continuation of the first Tinba post, which is part of a series of posts on how Tinba gradually infects a system. Before we jump into analysis, let’s do a quick recap of the previous actions performed by Tinba and described in the STAGE 1 post: Prepares...
Cyber-Attacks-Targeting-SWIFT
Cyber Attacks Targeting SWIFT – Recap
SWIFT stands for Society for Worldwide Interbank Financial Telecommunication, and its purpose is to allow banks and financial institutions in general to communicate securely. It is used in the exchange of information between banks, such as transactions. In this post you will get a short summary of the incidents...
GoIgnite
Blueliv winner of Go Ignite, the scale up program led by four world class telcos
Go Ignite, an alliance between four telecoms, announced last week the five winners selected from its inaugural call for start-ups launched at Mobile World Congress 2016, which attracted over 142 applications from the global start-up community. The winners were selected from the following categories: cyber security, big data analytics,...
money-conf
MoneyConf 2016: Machine Learning, Big Data and Data Privacy
Blueliv was thrilled to participate for the first time in the latest edition of MoneyConf 2016, based in Madrid. The event offered us the possibility, to attend select panel sessions and participate to roundtables with Top-level financial decision makers and introduce our Cybersecurity solution. We also had the privilege...
Gartner-summit
The Gartner Security Summit Washington DC 2016
Blueliv had the pleasure of spending a couple of days with the wider Gartner community at Gartner’s annual security conference held in Washington DC. The event lasted three and a half days and covered a wide range of security topics. The purpose of this blog post is to cover...
money-conf
We will be at MoneyConf, where the world’s biggest banks and tech firms meet
Next week we will be exhibiting at MoneyConf, which is hitting Madrid on June 21 and June 22. MoneyConf focuses on the future of finance where the world-leading financial institutions will mix with the most promising tech startups, such as Blueliv. Leading financial institutions find themselves facing a rising...
Inside-Tinba-DGA-Infection-Stage-1
Inside Tinba-DGA Infection: Stage 1
Tinba DGA is a bank trojan that was first discovered in 2012. It is mainly distributed through malware spam emails or malvertising. Although not a new threat, Tinba is still one of the used trojans by criminals to steal online banking sensitive information. There are a number of papers on how...
infosecurity2016
Blueliv at Infosecurity Europe London
We are happy to announce that next week Blueliv will be attending the Infosecurity conference in London, which will welcome the industry’s leading thought-leaders, practitioners, policy-makers and analysts. The 21st edition of Infosecurity Europe, Europe’s largest and most comprehensive Information Security event, will see more companies exhibit than ever...
corporate-blueliv
Blueliv at Gartner Security and Risk Management Summit
Next month on 13th of June Blueliv will attend the Gartner Security & Risk Management Summit in Washington, D.C. Gartner Security and Risk Management Summit 2016 provides attendees with proven practices and strategies needed to maintain cost-effective security and risk programs to support digital business and drive enterprise success. The...
corporate-blueliv
Blueliv continues with a strong momentum
We are happy to share the news of an unprecedented momentum we are currently experiencing at Blueliv with you. Last year we were named Gartner Cool Vendor in Communications Service Provider Security, where we were selected as one of the most promising, valuable, and innovative companies that enable telecoms...
corporate-blueliv
Blueliv is selected as part of Momentum Partners Cyber Security Review Q1 2016
We are happy to announce that Blueliv has been included in the Momentum Partners Q1 2016 Cyber Security Market Review as one of the most interesting companies in the Threat Intelligence field. Momentum Partners has completed their selection from the 1,500+ cyber security companies the firm tracks globally. Input...
Adaptive Security Model
Possible approaches to adaptive security
Traditional approaches to integrating cyber threat intelligence into an adaptive security model have relied very heavily on utilizing open source threat intelligence feeds and integrating these into a SIEM. The thinking behind this may have well been that the crowd-sourced threat intelligence is just as good if not better...
Securmatica-2016-Recap
Securmatica 2016 Recap
Last week the 27th annual Spanish security congress Securmatica took place. The purpose of the summit was to analyze the key factors in the cyber security industry, to showcase cyber defence strategies of leading companies, and to highlight the benefits of the collaborative models to fight cyber-crime. Blueliv together...
corporate-blueliv
Fast and affordable threat intelligence for MSSP
Rapidly changing threat vectors are too overwhelming for most medium-sized and large businesses to take on alone. They lack qualified, dedicated cyber threat intelligence professionals, because these resources are scarce and costly. They typically rely on specialized MSSPs to establish an effective, strategic response to current cyber threats. With Blueliv...
threat-exchange-network
Here is the Blueliv Threat Exchange Network!
This week marks an important milestone for us here at Blueliv with the announcement of our Threat Exchange Network (beta version). A new release of our strong collaborative community is out to continue fight cyber crime together. Blueliv Threat Exchange Network is designed to share IoCs such as IPs, URLs...
Malware-grabbers-and-their-behavior
Malware grabbers and their behavior
Malware is made to serve very different kinds of purposes, which depend on the objective of the authors. Nowadays, there is a very large number of samples that exist and it is common to classify them into different categories based on their behavior. This post provides an overview of...
corporate-blueliv
Blueliv will be at Securmatica
As the previous years, Blueliv will be sponsoring the standout infosec event Securmatica. The security congress will take place from April 26th to 28th in Madrid with the title “¿Qué le está pasando a la ciberseguridad?” (What is happening in the cyber security landscape?).  This edition aims to analyze which are...
Cyber-Security-Trends-2016
Cyber Security Trends 2016: Prevention, defence and reaction are priorities
The complexity of cyber threats will keep on growing so that traditional security measures will be unable to reduce them. CISOs will be forced to rethink on how to operate in the cyberspace and to adapt resilience to this new situation. There will be new threats and highly sophisticated attacks...
corporate-blueliv
Blueliv at “The new security paradigm” Telefonica’s event in Paris
Next April 5th we will participate in the Telefonica’s event “The new security paradigm: innovation and proactivity”, which will take place in Paris. The security landscape is constantly changing with new threats, and the products and solutions associated with preventing them, emerging all the time. Jordi Garasa, our VP Sales...
corporate-blueliv
Summary of the Security Conference RootedCON’16
As some of you might know, we’ve been sponsoring this year’s edition of the  cyber security RootedCON16 conference which took place in Madrid last week. This Spanish security conference is focused on showing innovative techniques and researches that can be of interest for security professionals and enthusiasts, and it lasts...
RSA-2016-Recap
RSA 2016 Recap!
Last week was an exciting week for all of us at Blueliv who were fortunate enough to attend the RSA 2016 Cyber Security Conference in San Francisco where we had a booth in the South Hall. The energy at the conference was amazing and people really seemed to love...
Antihooking-techniques-used-by-Andromeda-aim-to-defeat-Cuckoo-like-sandboxes
Antihooking techniques used by Andromeda aim to defeat Cuckoo-like sandboxes
Some sandboxes, for example, Cuckoo Sandbox, implement a technique known as hooking. The hooking of functions allows the programmer, user or analyst to intercept calls, messages or events passed between a program and its libraries. This is very useful when analyzing malware because it allows the reverse engineer to view...
corporate-blueliv
Blueliv supports Rooted CON 2016
Next week a new edition of the Rooted CON 2016 computer security conference will take place in Madrid, March 4 – 7 and we are proud to announce that we will sponsor the conference. The computer security conference Rooted CON born with the purpose of promoting the exchange of knowledge between members of...
corporate-blueliv
Video: Get started using our malware analysis sandbox today
A couple of weeks ago we launched a new community feature, our online malware analysis sandbox and now, it’s time to show you how it works and the varied functionalities it offers to our community users. At Blueliv we are focused on trying to make cyber intelligence available for...
corporate-blueliv
Meet Blueliv team at RSA, booth S738
The countdown begins for the most established IT security event in the world, RSA Conference. As a proud participant in RSA, we invite you to join us at booth #S738 South Hall in San Francisco, February 29 – March 4 where you’ll have the opportunity to see how our Targeted and Automated Threat Intelligence Solution...
research-blog
Tracking the footprints of PushDo Trojan
PushDo Trojan is a downloader trojan responsible for downloading its spam counterpart and other malicious Trojans. Since its beginning, it has evolved into many different versions and in this blog post, we will make a deeper analysis of it. The Packer PushDo Trojan often comes along with a packer, which...
corporate-blueliv
Visit Blueliv at RSA Conference, booth #S738
It’s that time of the year again – time for one of our favorite conferences, RSA! Last year was our first year at RSA and we are thrilled to be returning as a sponsor of the 2016 RSA Conference in San Francisco, California. From February 29th to the March 4th,...
Adaptive-Security-Architecture-to-protect-companies
Adaptive Security Architecture to protect companies from Advanced Attacks
Adaptive security will become one of the key phrases you will hear over and over again this year. As with many new concepts, the term itself can be hindered by the varied definitions people attach to it and the context within which it is used. In this instance I...
corporate-blueliv
The best of Blueliv’s blog: Most read posts of 2015
Catching up on some reading this week? We took a look back at Blueliv’s blog posts in 2015 to see which stories were most read by our audience and came up with 10 best Blueliv’s blog posts for the last year. It was a year full of huge stories...
corporate-blueliv
Merry Christmas and Happy New Year!
At the holiday season, our thoughts turn to those who have made Blueliv’s progress possible. It is in this spirit we would like to say: Thank you and best wishes for the Holiday Season and coming New Year! Blueliv team
industry-blog
No cON Name’15, Summary of the Spanish Premier Technical Security Conference
For those of you who haven’t heard about it, No cON Name is a Spanish security conference that takes place in Barcelona every year, where experts from all around Spain, and sometimes, around the world, gather to share their security-related findings. This year, we attended a number of cool keynotes...
corporate-blueliv
Revisiting Blueliv’s most popular news of the year
This year is just about over and it’s almost time to welcome 2016. We love the reflection that comes along with the close of a time period, and the hope that comes with looking ahead. We have been working on the fight against cyber crime during 2015 and next...
corporate-blueliv
Botconf’15, the botnet fighting conference
As you probably already know if you have been following us on twitter, Blueliv has attended the Botconf this year, the only international conference totally dedicated to the fight against botnets which took place at the Google office in Paris last week. After the success of the two first editions of...
corporate-blueliv
Blueliv and IPS announce partnership to deliver world-class threat intelligence solutions to the Canadian market
Today we announce that we have signed a strategic partnership with IPS, a leading Canadian provider of information security, compliance and managed security services. As a first-class provider of managed security solutions for the North American marketplace, Blueliv is excited to announce IPS as a partner, adding Proactive Threat...
corporate-blueliv
An open and agile malware analysis sandbox, the new community feature
Blueliv has always been focused on trying to make Cyber Intelligence available for everyone and believes that sharing intelligence is the key to get the upper hand in an ever-changing war on cyber crime. We began with the free Cyber Threat Intelligence API, so you could feed your systems...
corporate-blueliv
ThreatStream and Blueliv announce a partnership to offer unique cyber threat intelligence
Following our intelligence sharing philosophy, we are happy to announce our alliance with ThreatStream. From today, the Blueliv Threat Intelligence Feed will be part of the ThreatStream Alliance of Preferred Partners (APP) store, allowing its users to have access to unique intelligence about verified online crime servers conducting malicious...
Blueliv-Releases-Q3-2015-Global-Cyber-Threat-Report
Blueliv Releases Q3 2015 Global Cyber Threat Report
  Between July and September 2015 Blueliv detected and analyzed 5.5 million stolen credentials and credit cards, 300,000 targeted malware samples, and 500,000 crime servers through its cyber threat intelligence platform. Now, we want to share the analysis of this data with you in our Blueliv Global Cyber Threat Report. THEFT...
Revisiting-the-latest-version-of-Andromeda-Gamarue-Malware1
Revisiting the latest version of Andromeda/Gamarue Malware
Andromeda Malware aka Gamarue Malware has been prevalent since it came into limelight a couple of years ago. Also, the author keeps it well updated ever since. With respect to its earlier avatars, it has gone through several changes from anti-analysis to a change in protocol format. Some excellent write-ups...
corporate-blueliv
Secure Group and Blueliv announce strategic partnership to deliver Security Intelligence in Italy
We continue expanding globally and today, we are happy to inform you that we have signed a strategic partnership with Secure Group, the Security Division of Yotta Tecnologie and the leading Italian Managed Security Services Provider. With more than 15 years in the market, Secure Group offers their customers...
Dridex-reloaded
Dridex reloaded?
Dridex has been the scourge of banks regarding bank data and credential theft as well as fraud in the last 12 months. Cyber criminals have been improving the network following the special cases and problems they have faced depending on the financial institutions they have attacked. They have also...
corporate-blueliv
Blueliv supports the 2015 National Cyber Security Awareness Month
October 1 marked the start of the 12th annual 2015 National Cyber Security Awareness Month (NCSAM), led by the National Cyber Security Alliance (NCSA), and we are happy to announce that Blueliv is supporting it. As an official champion, we recognize our commitment to cybersecurity and online safety. Celebrated every October, National...
corporate-blueliv
Blueliv supports the 2015 National Cyber Security Awareness Month
Blueliv has developed an input plugin for Logstash that, with the help of the ELK stack, provides real-time, actionable cyber threat intelligence to help organisations understand the scale of cyber threats currently aligned against them.  Why the ELK stack? Most companies that are defending themselves against these attacks use some...
industry-blog
Collaborative Information Exchange Models to Fight Cyber Threats
The fight against cybercrime should take on a new direction. It should utilize the collaborative models of social media also referred to as Web 2.0 technologies that allow for the socialization of the fight against cyber threats through a community or group. This is how we can overcome the...
October-events
October events
Experts from Blueliv are going to participate in a range of events in October. We want to share them with you, as they might be of your interest, that’s why we invite you to find out about them bellow. Cyber Security 2015 “Act Differently”, 3-4 October, Stresa, Italy. Blueliv...
Introduction-to-honeypots
Introduction to honeypots
As most of you already know, honeypots are hosts that act as a bait, exposing services on the internet in order to lure attackers. Below is a honeypots introduction. Using honeypots, security researchers can: Monitor the attackers’ activity on the internet. Discover possible vulnerable services being exploited by an...
corporate-blueliv
Blueliv, speaker at the next Barcelona Elastic Meetup
We are really happy to announce that Blueliv will participate in the next Barcelona Elastic Meetup, which will take place on October 7th at Itnig. There, João Alves, Software Engineer at Blueliv, will give a presentation. Here  is an abstract: Every day thousands of companies worldwide are affected by...
corporate-blueliv
La socialización de la lucha contra las ciberamenazas
La revista de ciberseguridad SIC ha publicado en su número de septiembre el artículo escrito por Daniel Solís, CEO de Blueliv, La socialización de la lucha contra las ciberamenazas. La lucha contra el cibercrimen debe tomar una nueva dirección en la que modelos colaborativos 2.0 permitan socializar la lucha contra las ciberamenazas mediante una comunidad...
corporate-blueliv
Splunk App for Blueliv tutorial
As you may already know, the Splunk® App for Blueliv is available for users to be able to access the Blueliv’s Cyber Threat Information Intelligence Feed through Splunk console. Below you will find a Splunk App Blueliv tutorial to help you set it up and use it effectively. The...
Botnets-and-C&C-Trial
Botnets and C&C Trial: Detect Infections in your Computer and Retrieve Compromised Credentials
Botnets and other malicious software attacks that compromise corporate PCs are increasing at an alarming rate and growing in sophistication. In the first half of the year, Blueliv detected and analyzed more than 10 million stolen credentials and credit cards and is now tracking more than 220,000 live crime...
corporate-blueliv
September events
August is getting to its end and it’s time to think of the coming school year, which is around the corner full of new projects. At Blueliv we are more than ready for the coming months and today we would like to inform you about the cyber security events taking...
industry-blog
Want to fight cyber threats? Start collaborating
It is universally known that no one, be it an individual or a company, can hope to find and neutralize every threat that can be found out in the wild. In cyber crime there is a tendency towards industrialization. You can find forums and marketplaces where services (such as...
Blueliv-Releases-Q2-2015-Global-Cyber-Threat-Report
Blueliv Releases Q2 2015 Global Cyber Threat Report
Through its cyber threat intelligence platform Blueliv detected and analyzed 5 million stolen credentials and credit cards, 200,000 targeted malware samples, and 500,000 crime servers between April and June 2015. THEFT OF CREDIT AND DEBIT CARD INFORMATION In the second quarter of 2015, the US has continued to be the...
research-blog
Blueliv discovers the Alina variant – Joker
Joker malware is a Point of Sale malware that was developed using, as a baseline, the Alina POS source code. After tracking it for some weeks, we’ve realized that behind the malware there is a dedicated effort towards developing and improving the sample. We have got our hands on...
corporate-blueliv
Are your IPs infected? Check it now!
We are excited to introduce to you a new IP infection detection tool on our community: you can now look up an IP and see if it belongs to crime servers reported on our Cyber Threat Intelligence platform. Further information such as the domain, the country where this IP...
corporate-blueliv
Cyber Threat Data Feed, ultra fresh intelligence at your fingertips
We are pleased to announce that we have launched the Cyber Threat Intelligence Data Feed which will allow any organization to track the threats that are aligned against it in real-time and to quantify and qualify what attack vectors are being used by malicious attackers. Cyber Threats have become the most common...
corporate-blueliv
Empowering your ELK stack with Blueliv plugin
We have just released a new application for ELK stack. The ELK stack contains Elasticsearch, Logstash, and Kibana. Although they have all been built to work exceptionally well together, each one is a separate open source project that is driven by Elastic. The role of each of these technologies is divided as...
Introduction-to-Android-Malware
Introduction to Android Malware
Hello everyone! As some of you already know, mobile threats are on the rise. Every day there are more and more mobile devices, which translates in more targets for the malware industry. But, as we always say, the best weapon against malware is knowledge. For this reason, we bring...
corporate-blueliv
We will paticipate at the Innovation in cyber security applied to the protection of digital identity summer course
Next week we will participate in the Innovation in cyber security applied to the protection of digital identity summer course. The course, which is organized by the Rey Juan Carlos University, will take place from July 6th to 8th in Aranjuez. There will be a space dedicated to startups and...
corporate-blueliv
We keep growing and internationalizing!
Some months ago we told you we moved into a bigger new office in Barcelona. Today we are glad to let you know we have opened two new international offices to be more accessible to our worldwide clients and increase the internationalization of the company: London and San Francisco....
research-blog
Webinar. Chasing the Cyber Crime: network insights of Dyre and Dridex Trojan Bankers.
We would like to invite you to the Chasing the Cyber Crime: network insights of Dyre and Dridex Trojan Bankers webinar on the 8th of July.  As you may already know, in the current landscape of Trojan Bankers, Dyre and Dridex are the most nefarious ones due to the amount of infections...
corporate-blueliv
We will be at BSides Lisbon 2015
Next week, July 3rd, we will be sponsoring BSides Lisbon 2015. The security conference will consist of two tracks with really interesting security talks.   We want to give you the opportunity to attend the conferences and that’s why we are offering 3 free tickets to the first three people that...
Why-is-Blueliv-Gartner-cool
Why is Blueliv Gartner “cool”?
Recently Blueliv has been designated a Cool Vendor in Communications Service Provider Security, 2015 and in this post I want to try and encapsulate what was it that made us “cool”. The Blueliv solution has a number of key features that will make it immediately apparent why Gartner has labelled...
research-blog
Introduction to Blueliv’s API, part1
Greetings everyone! Today we want to introduce you a little bit more to our API and show you all the amazing things you can do with the data. This post is the first of a series that we plan to write in order to make things easier for you...
corporate-blueliv
Python SDK to access our Cyber Threat Intelligence API, updated
We have just updated the Python SDK to access our API. Using our Python SDK allows you to take advantage of our cyber-threat intelligence data faster, requiring less coding than using it manually. Taking into account the feedback provided by our users, we decided to improve our Python SDK...
corporate-blueliv
Blueliv named a “Cool Vendor” by Gartner
We are proud to announce that Blueliv has been included in the list of “Cool Vendors” in the 2015 report titled, “Cool Vendors in Communications Service Provider Security, 2015” by Deborah Kish, Akshay K. Sharma, Craig Lawson at Gartner, Inc. This is the first year that Gartner has selected...
industry-blog
Threat Intelligence & RSA
Cyber Defense Magazine has just published the following article of Nahim Fazal, Head of International Business Development at Blueliv. RSA 2015 was very much the year of Threat Intelligence. That is the overwhelming sensation one is left with as the dust settles on the RSA conference for this year. Perhaps more...
research-blog
Performing automated Yara Q&A with Cuckoo
As it is well known, Cuckoo Sandbox is a malware analysis system which allows us to customize both processing and reporting stages. In this context, we can feed Cuckoo with Yara Rules based not only on the content of malware, but also on its behavior. One of the most prominent issues...
corporate-blueliv
Want different results? Quit doing the same. Interview with Daniel Solis, CEO & Founder
In one phrase, define Blueliv. We are the innovators, the paradigm-shifters. We’re a company dedicated to fighting cyber threats in ways no one has ever done before. With this approach, we’re able to view cyber threats and attacker characteristics from an unconventional perspective and successfully anticipate targets and potential outcomes....
Fighting-cyber-crime-by-using-Splunk
Fighting cyber crime by using Splunk
As we told you in the post about our free API, threat intelligence is the key factor in the fight against cyber crime and cyber threats, mostly because this intelligence helps you and your organization to prevent and mitigate attacks. But the issue usually is gathering this information. That’s...
Blueliv-Releases-Q1-2015-Global-Cyber-Threat-Report
Blueliv Releases Q1 2015 Global Cyber Threat Report
  Blueliv reveals startling scale of cybercrime, pinpoints geolocations most affected Dyre and Dridex, the most nefarious banking Trojans Blueliv releases its Cyber Threat Report, revealing detailed figures on criminal online activity in the first quarter of 2015. Through its cyber threat intelligence platform between January and March 2015, Blueliv...
corporate-blueliv
New Splunk App for Blueliv
Blueliv has just released a new application for Splunk®. Splunk is an event analyzer that collects data generated by any source and provides the user with tools and dashboards to analyze and correlate this data.  With this App, Splunk users will be able to access the Blueliv’s Cyber Threat...
corporate-blueliv
We are pleased to share our cyber space video with you!
We are pleased to announce that Blueliv’s video is ready for the cyber world to view. The video, based on a cyber space video game, explains how our targeted cyber threat solution can turn global threats into predictive and actionable intelligence. Thinking from new perspectives is what we do. We dig...
research-blog
Ciberamenazas emergentes. A qué nos enfrentamos y cómo lo combatimos
La revista de ciberseguridad SIC ha publicado en su número de abril el artículo escrito por Ramón Vicens, VP Threat Intelligence de Blueliv, y Víctor Acín, analista de Threat Intelligence de Blueliv, Ciberamenazas emergentes. A qué nos enfrentamos y cómo lo combatimos. En los últimos años las bandas del...
corporate-blueliv
Join Blueliv in the fight against cybercrime with our free API
From Blueliv we believe that sharing expertise and intelligence is the key to get the upper hand in an ever-changing war on cyber crime. But the issue, usually, is where to acquire this information. We think that fighting e-crime should be a possibility for everyone, and for that reason,...
Blueliv-Releases-Q1-2015-Global-Cyber-Threat-Report
Chasing cybercrime: network insights of Dyre and Dridex Trojan bankers. (Report)
Trojan Bankers are a family of botnets that specialize in stealing information related to the financial sector and user data in order to sell it in underground marketplaces, some of them, also perform wire transfers using these credentials or by taking control of the infected computer. Due to the...
corporate-blueliv
Blueliv Cyber Threat Map
We are pleased to announce that we have just launched an interactive Cyber Threat Map which shows in real time the geolocation of cybercrime servers that are actively engaged in criminal activity such as credit card theft, credential theft or malware distribution. And anyone can access it via our...
Blueliv-will-be-at-Securmatica-next-week
Blueliv will be at Securmatica next week
As the previous years, Blueliv will be participating at Securmatica next week. The security congress will take place from April 21st to 23rd in Madrid and will focus on innovation and change, with the title Innovación y cambio: Manos a la obra (Innovation and change: Get down to work). In...
corporate-blueliv
Visit Blueliv at RSA booth #321
Stop by the Blueliv booth #321 at the annual RSA security conference to see how our Targeted Cyber Threat Intelligence Platform can turn global threats into predictive, actionable intelligence and help stop cyber threats against your organization. Join us at booth #321 South Hall, learn more about the latest discovered...
Main-PoS-infection-techniques
Main PoS infection techniques and how to avoid them
Stealing payment card data has become an everyday crime that yields quick monetary gains. The goal is to steal the data stored on the magnetic stripe of payment cards, clone the cards, and run charges on the accounts associated with them or even burn credit card track information into...
industry-blog
How could UBER accounts have been compromised?
Uber is an American company that develops and operates a mobile application that allows users to provide and employ transporting services for people. Motherboard reported last week that thousands of active Uber accounts are for sale in black markets located in the dark web. After investigating the issue, Uber...
Demo Free Trial Community