Tag selected: Threat Detection Tools
What does threat mitigation mean in practice?
Cyber threats have reached epidemic proportions. In the UK for example, nearly half (43%) of all businesses polled by the government in 2018 said they’d suffered a security breach or attack in the previous 12 months — and the real figure could be much higher. One vendor said it...
threat-exchange-network
New Release of Blueliv Threat Exchange Network
Cyber-criminals are very well organised and typically operate as part of highly sophisticated and specialised criminal organizations. Needless to say, in terms of the skills and methods used they are often years ahead of the businesses and establishments they target. In response, companies are increasingly hiring cyber security specialists,...
threat-exchange-network
Here is the Blueliv Threat Exchange Network!
This week marks an important milestone for us here at Blueliv with the announcement of our Threat Exchange Network (beta version). A new release of our strong collaborative community is out to continue fight cyber crime together. Blueliv Threat Exchange Network is designed to share IoCs such as IPs, URLs...
industry-blog
Collaborative Information Exchange Models to Fight Cyber Threats
The fight against cybercrime should take on a new direction. It should utilize the collaborative models of social media also referred to as Web 2.0 technologies that allow for the socialization of the fight against cyber threats through a community or group. This is how we can overcome the...
Introduction-to-honeypots
Introduction to honeypots
As most of you already know, honeypots are hosts that act as a bait, exposing services on the internet in order to lure attackers. Below is a honeypots introduction. Using honeypots, security researchers can: Monitor the attackers’ activity on the internet. Discover possible vulnerable services being exploited by an...
Botnets-and-C&C-Trial
Botnets and C&C Trial: Detect Infections in your Computer and Retrieve Compromised Credentials
Botnets and other malicious software attacks that compromise corporate PCs are increasing at an alarming rate and growing in sophistication. In the first half of the year, Blueliv detected and analyzed more than 10 million stolen credentials and credit cards and is now tracking more than 220,000 live crime...
industry-blog
How to avoid a Dridex infection?
In the recent days we have been seeing a lot of commotion around the botnet Dridex. This improved version of Dridex is proliferating thanks to an effective phishing campaign. Taking advantage of the proximity of the annual tax declaration, the organization behind this botnet is sending emails to unsuspecting...
Demo Free Trial Community