Five tips for safer remote work

As we have been touching on in other blogs, cybercriminals continue to cash in while the world worries about the threat to life and liberty from COVID-19. The factors playing in their favor include: Fear, uncertainty and the thirst for information making users more susceptible to interaction with malicious emails, ... Read More

DARK COMMERCE: parallel economy provides easy on-ramp for would-be cybercriminals

The cybercriminal industry is evolving, with a growing shadow economy that trades goods and services in much the same way as the legitimate cybersecurity sector. Today we publish a new report and the first in a series analyzing this evolution – DARK COMMERCE: Exploring the cybercrime industry and its business ... Read More

Business continuity during Coronavirus / COVID-19 outbreak

| | Blog, Corporate
Blueliv is closely monitoring the rapidly changing developments related to the novel coronavirus, or COVID-19. As yet, we have little certainty around the long term impact that COVID-19 will have on our daily lives. However, it is important to communicate that Blueliv is prepared to handle the crisis in the ... Read More
coronavirus

Cybercriminals taking advantage of the Coronavirus

In recent weeks, we have witnessed cybercriminals trying to cash in on global fears about the novel coronavirus. Analysts across various intelligence vendors have observed that cybercriminals are taking advantage of the outbreak. As many individuals search for the latest online information about COVID19, a variety of TTPs have been ... Read More

Eight ways to improve cyber-hygiene in the enterprise

Good hygiene keeps you safe and healthy, as well as others around you. It’s the same with cyber-hygiene – the sets of practices that organizations are increasingly adopting in a structured way to complement their technological layers of cyberdefense. We highlight cyber-hygiene in many of our publications – alongside regularly ... Read More

Governance, risk and compliance: how does threat intelligence help?

| | Blog, Threat Intelligence
The mark of a well-run business is its ability to control and align all its operations to support whatever goals it wants to achieve; steering clear of risk, maximizing opportunity and ensuring compliance with regulation and industry standards. This is a significant undertaking, particularly for large organizations, commonly managed under ... Read More

Deploying the right threat intelligence at the right level

| | Blog, CISO, SOC, Threat Intelligence
Threat intelligence has an influential role to play in organizations, but – like any technology-related solution – it must be applied in the right way to meet its full potential. This blog discusses how to maximize resources by deploying the right threat intelligence, at the right level, for your organization ... Read More
Picture1 CVE-2020-0601

Brief analysis of CVE-2020-0601

Microsoft has recently released a patch for a severe vulnerability affecting Windows 10, and Windows Server 2016 and 2019, as predicted by Brian Krebs amongst others on Monday 13 January 2020. CVE-2020-0601 The flaw, assigned the CVE identifier CVE-2020-0601, involves one of the most basic components of the Windows API, ... Read More

Malware vs. Antivirus: the never-ending story (Part III)

In 2008, Eva Chen, Trend Micro’s CEO declared: “In the antivirus business, we have been lying to customers for 20 years”. Seven years later, Bryan Dye, Symantec SVP Information Security, stated, “[antivirus] is dead”. Despite these declarations, antivirus remains a billion-dollar industry with millions of users, whether they are individuals, ... Read More

Malware vs. Antivirus: the never-ending story (Part II)

In 2008, Eva Chen, Trend Micro’s CEO declared: “In the antivirus business, we have been lying to customers for 20 years”. Seven years later, Bryan Dye, Symantec SVP Information Security, stated, “[antivirus] is dead”. Despite these declarations, antivirus remains a billion-dollar industry with millions of users, whether they are individuals, ... Read More