Tag selected: Threat Detection Tools
What does threat mitigation mean in practice?

on

November 30, 2018

Cyber threats have reached epidemic proportions. In the UK for example, nearly half (43%) of all businesses polled by the government in 2018 said they’d suffered a security breach...

threat-exchange-network
New Release of Blueliv Threat Exchange Network

on

August 10, 2016

Cyber-criminals are very well organised and typically operate as part of highly sophisticated and specialised criminal organizations. Needless to say, in terms of the skills and methods used they...

threat-exchange-network
Here is the Blueliv Threat Exchange Network!

on

April 14, 2016

This week marks an important milestone for us here at Blueliv with the announcement of our Threat Exchange Network (beta version). A new release of our strong collaborative community...

industry-blog
Collaborative Information Exchange Models to Fight Cyber Threats

on

October 7, 2015

The fight against cybercrime should take on a new direction. It should utilize the collaborative models of social media also referred to as Web 2.0 technologies that allow for...

Introduction-to-honeypots
Introduction to honeypots

on

September 29, 2015

As most of you already know, honeypots are hosts that act as a bait, exposing services on the internet in order to lure attackers. Below is a honeypots introduction....

Botnets-and-C&C-Trial
Botnets and C&C Trial: Detect Infections in your Computer and Retrieve Compromised Credentials

on

September 3, 2015

Botnets and other malicious software attacks that compromise corporate PCs are increasing at an alarming rate and growing in sophistication. In the first half of the year, Blueliv detected...

industry-blog
How to avoid a Dridex infection?

on

March 25, 2015

In the recent days we have been seeing a lot of commotion around the botnet Dridex. This improved version of Dridex is proliferating thanks to an effective phishing campaign....

Demo Free Trial Community