Tag selected: Cyber Attacks
Threat Exchange Network blog: July 2018

on

August 1, 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in...

Threat Exchange Network blog: June 2018

on

July 2, 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and more in...

industry-blog
Threat Exchange Network blog: April 2018

on

May 3, 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and...

industry-blog
Threat Exchange Network blog: March 2018

on

March 27, 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and...

industry-blog
Threat Exchange Network blog: February 2018

on

March 1, 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and...

industry-blog
Threat Exchange Network blog: January 2018

on

February 1, 2018
The Blueliv Threat Exchange Network is a global community of thousands of cybersecurity experts, IT professionals and academics. Each month members publish the latest news, threat data, IOCs and...

research-blog
Making the headlines: Bad Rabbit and Reaper malware

on

October 27, 2017
Though we process thousands of malware samples per day, very few of them attract the attention of the mainstream media in the way that Bad Rabbit and Reaper have...

research-blog
TrickBot banking trojan using EFLAGS as an anti-hook technique

on

October 6, 2017
In one of our analysis of the TrickBot banking trojan, we found an interesting anti-sandbox that catches (almost) all user-mode (ring3) sandboxes, and we would like to share it...

sonic-drive-in-credit-card-theft-detection-use-case
Sonic Drive-In | Credit Card Theft Detection Use Case

on

October 5, 2017
Photo courtesy Sonic Franchises On September 26, 2017, Sonic the U.S. fast-food chain based in Oklahoma City, OK, with about 3,600 locations across 45 states, acknowledged that their...

Avoid-being-the-next-Equifax
Data Breach | Avoid being the next Equifax

on

September 19, 2017
Image Courtesy CNN Money On 29 July 2017, Equifax, one of the big-three credit reporting companies, announced the discovery of a data breach exposing an estimated 143M Americans. Unauthorized...

avoid-toxic-rogue-mobile-apps
Threat intelligence to help you avoid toxic rogue mobile apps

on

August 23, 2017
Image Courtesy BBC News How did my dad’s Uber account get hacked? Sometime around July 6, 2017, ABC News Brisbane reporter Josh Bavas, received 2 a.m. notification that someone...

brand-abuse
10 things you need to know about brand abuse and how to stay alerted to them

on

August 11, 2017
Brand abuse is a big problem, and it’s getting bigger. Between 2010-2014, the EU, US, and Japanese customs authorities seized and estimated €467.5M EU / $953.2M US / ¥100M...

Man-in-the-browser
How banks can protect customers from “Man in the browser attacks”

on

August 4, 2017
Criminal groups use a wide range of methods to compromise users and siphon its bank accounts, for this reason, when a user’s computer is infected by a malware, depending...

Targeted-malware-detection
Targeted Malware Detection

on

July 27, 2017
Today’s cyber criminal wants one thing. He wants to get his malware into your IT network because once he’s in, he can go to work–remotely–achieving the myriad of other...

colors-of-cybersquatting
The many colors of cybersquatting – Do not underestimate them

on

July 7, 2017
Blueliv Guest Post | Jean-Jacques Dahan, Managing Director and Expert Consultant for Online Brand Security & Global Domain Strategy at Zeusmark. Cybersquatting is a constant challenge for a company. It is...

ruthless-cybersquatters
Protect your business against ruthless cybersquatters

on

July 6, 2017
Also this week: Blueliv is pleased to announce a featured post on the subject of Cybersquatting from Jean-Jacques Dahan–Managing Director and Expert Consultant for Online Brand Security & Global...

Petya-ransomware-2
Petya Ransomware cyber attack is spreading across the globe – Part 2

on

June 29, 2017
Following our first blog providing an early analysis about Petya, we are sharing further findings of the malware analysis that we have performed. We divided this post into the...

Petya-ransomware-1
Petya Ransomware cyber attack is spreading across the globe – Part 1

on

June 27, 2017
As you might know, Petya Ransomware is currently devastating Airlines, Banks & Utilities and many other businesses across the globe. Denmark, France, Spain, Ukraine, and the USA are already...

phishing
Business threat intelligence | Win the fight against phishing attacks

on

June 21, 2017
Blueliv has one module that handles two of the main cyber threats targeted at businesses–Phishing and Cybersquatting. This module plugs into our threat monitoring Enterprise Platform Solution. For completeness,...

threat-exchange
Blueliv Threat Exchange Network | A community of early cyber responders

on

June 13, 2017
Cybercrime has become a socialized industry, and as such criminals employ community knowledge and resources found on the dark web and deep web to intensify efforts. In 2016, Europol...

honeypots-wannacry
What our honeypots taught us about Wannacry ransomware

on

May 23, 2017
WannaCry has been on the lips, and especially in the concerns of everyone these last days. As we have addressed in recent posts, Friday, 12th May, marked the beginning...

wannacrypt-analysis2
WannaCrypt Malware Analysis

on

May 15, 2017
Last Friday, 12th May, a worm targeting outdated Windows machines was detected. The worm in question used leaked NSA exploits to propagate and dropped a variant of a ransomware...

wannacry
Wannacry Ransomware used to spread global cyber attacks

on

May 12, 2017
A global ransomware attack began impacting companies and hospitals across the United States, Europe, and Asia early Friday morning. Companies in more than 70 countries have reported incidents as...

wannacry2
El ransomware ataca contundentemente el IBEX-35
Este viernes ha saltado la noticia de que el ransomware “WannaCry” se ha colado en los sistemas informáticos de algunas de las empresas del IBEX-35 aprovechando una vulnerabilidad de...

credit-card-theft1
The real cost of credit card theft and how to protect your assets

on

May 11, 2017
Sometime in mid-February 2017, anti-fraud teams from multiple financial institutions contacted KrebsOnSecurity for help tracing the source of a credit card fraud happening in high-end restaurants around the U.S....

botnets
Peeling back the layers surrounding zombie computer botnets

on

May 3, 2017
What is a Botnet? To understand a botnet, you first must begin with a bot. A bot is an automated malware program or roBOT that takes control of a...

corporate-blueliv
Why Vawtrak v2 could be the next major banking Trojan

on

December 15, 2016
Neira Jones, Non-Executive Director Cognosec, Partner Global Cyber Alliance and industry influencer shares her thoughts on the evolution of banking Trojans and digital transformation in the finance sector in...

industry-blog
Don’t end up in the dark this Black Friday

on

November 22, 2016
Don’t end up in the dark this Black Friday! Online sales in the US are predicted to increase by over 13% this Black Friday vs. 2015, surpassing $3billion. Is...

industry-blog
Hacking group Shadow Brokers infiltrate NSA Equation Group

on

August 18, 2016
Militarization of cyberspace is no longer a novelty. Instances of governments using sophisticated zero-day malware against other nations’ organizations and industry have been seen before now. This week a...

Ransomware chronology
Ransomware – How to defend yourself against it

on

August 3, 2016
What is Ransomware? Ransomware is a type of malware that has lately been increasingly in use by the cyber criminals. In order to profit from the distribution of Ransomware,...

Cyber-Attacks-Targeting-SWIFT
Cyber Attacks Targeting SWIFT – Recap

on

July 13, 2016
SWIFT stands for Society for Worldwide Interbank Financial Telecommunication, and its purpose is to allow banks and financial institutions in general to communicate securely. It is used in the...

industry-blog
How could UBER accounts have been compromised?

on

April 6, 2015
Uber is an American company that develops and operates a mobile application that allows users to provide and employ transporting services for people. Motherboard reported last week that thousands...

research-blog
The Equation Group: a new degree of sophistication in APT attacks

on

March 12, 2015
The Equation Group, what do we know so far? The topic of APT’s and state sponsored espionage has been back the news over the last few weeks. Based in...

research-blog
Blueliv Cyber Threat Intelligence Report. Q3 2014

on

November 26, 2014
Here you are the main conclusions of the just analyzed cyber threats that have been apparent on a global level during the third quarter of 2014, comparing them with the...

research-blog
Measuring the impact of Shellshock in the threat intelligence landscape

on

October 27, 2014
Once high profile vulnerability is released to the public, there are a lot of people who will use the opportunity to take advantage on vulnerable machines, even if it is...

industry-blog
People becoming unfazed to cyber attacks?

on

October 15, 2014
When Target was hacked last year the incident made headline news for months. Target reported that their Q4 sales dropped 46% and their stock took an 11% dip. Most...

industry-blog
Cyber-attack against JPMorgan Chase

on

October 9, 2014
A cyber-attack targeting JPMorgan Chase this summer compromised over 75 million household according to a statement recently released by Chase Bank. The data stolen included names, addresses and email...

research-blog
Defining the key elements of a cybersecurity strategy

on

September 18, 2014
There is not a day that goes by without some startling revelation about a new threat from emerging from the world of Cyber-Crime. Over the last few months there...

research-blog
The week of Russian leaks

on

September 12, 2014
This week some important leaks have arisen in on the Internet, all of them related to Russian users: 1.000.000 Yandex addressess and passwords. 4.500.000 Mail.ru addressess and passwords. 5.000.000...

corporate-blueliv
The exponential cyber threat to mobile commerce

on

May 22, 2014
As m-commerce grows, recent research reveals that security is a major concern for consumers making payments by smartphone. The security threats against the mobile channel are growing; using the...

research-blog
Origin of the infections and attacks during the first quarter of 2014

on

May 8, 2014
Blueliv has analyzed the main Cyber Threats which have been apparent on a global level during the first quarter of 2014, and in this post we are going to...

research-blog
Behind Point of Sale (PoS) attacks

on

April 24, 2014
In this previous article we showed how cybercriminals were trying to infect PoS devices with Dexter malware through pcAnywhere service, port 5631. Now, what we want is to analyze...

research-blog
First million credit cards details released

on

April 3, 2014
1 million credit cards details over a set of 800 million was released on Pastebin early this week. Almost 1 million cards were allegedly leaked by Anonymous Ukraine on...

research-blog
Uncovering the new modus operandi behind POS infections

on

April 1, 2014
In the Cyber Fraud world there are numerous ways of doing business. One of the most well-known fraud activities that has been alive for years is the credit card...

research-blog
mount.cifs arbitary file identification 0day

on

April 25, 2012
Durante el wargame de la rootedcon 2012, además de participar, me dediqué a revisar un poco los sistemas. Puesto que no tenía disponible el /proc/kallsyms, hacer ataques al kernel,...

research-blog
Meterpreter Cheat Sheet

on

June 15, 2010
Con el objetivo de contribuir en la divulgación de conocimiento en materia de seguridad informática y comunicaciones, desde blueliv, hemos desarrollado un “chuletario” de los comandos más relevantes de...

Community Trial Demo