Five tips for safer remote work
As we have been touching on in other blogs, cybercriminals continue to cash in while the world worries about the threat to life and liberty from COVID-19. The factors playing in their favor include: Fear, uncertainty and the thirst for information making users more susceptible to interaction with malicious emails, ... Read More
DARK COMMERCE: parallel economy provides easy on-ramp for would-be cybercriminals
The cybercriminal industry is evolving, with a growing shadow economy that trades goods and services in much the same way as the legitimate cybersecurity sector. Today we publish a new report and the first in a series analyzing this evolution – DARK COMMERCE: Exploring the cybercrime industry and its business ... Read More
Business continuity during Coronavirus / COVID-19 outbreak
Blueliv is closely monitoring the rapidly changing developments related to the novel coronavirus, or COVID-19. As yet, we have little certainty around the long term impact that COVID-19 will have on our daily lives. However, it is important to communicate that Blueliv is prepared to handle the crisis in the ... Read More
Cybercriminals taking advantage of the Coronavirus
In recent weeks, we have witnessed cybercriminals trying to cash in on global fears about the novel coronavirus. Analysts across various intelligence vendors have observed that cybercriminals are taking advantage of the outbreak. As many individuals search for the latest online information about COVID19, a variety of TTPs have been ... Read More
Eight ways to improve cyber-hygiene in the enterprise
Good hygiene keeps you safe and healthy, as well as others around you. It’s the same with cyber-hygiene – the sets of practices that organizations are increasingly adopting in a structured way to complement their technological layers of cyberdefense. We highlight cyber-hygiene in many of our publications – alongside regularly ... Read More
Governance, risk and compliance: how does threat intelligence help?
The mark of a well-run business is its ability to control and align all its operations to support whatever goals it wants to achieve; steering clear of risk, maximizing opportunity and ensuring compliance with regulation and industry standards. This is a significant undertaking, particularly for large organizations, commonly managed under ... Read More
Deploying the right threat intelligence at the right level
Threat intelligence has an influential role to play in organizations, but – like any technology-related solution – it must be applied in the right way to meet its full potential. This blog discusses how to maximize resources by deploying the right threat intelligence, at the right level, for your organization ... Read More
Brief analysis of CVE-2020-0601
Microsoft has recently released a patch for a severe vulnerability affecting Windows 10, and Windows Server 2016 and 2019, as predicted by Brian Krebs amongst others on Monday 13 January 2020. CVE-2020-0601 The flaw, assigned the CVE identifier CVE-2020-0601, involves one of the most basic components of the Windows API, ... Read More
Malware vs. Antivirus: the never-ending story (Part III)
In 2008, Eva Chen, Trend Micro’s CEO declared: “In the antivirus business, we have been lying to customers for 20 years”. Seven years later, Bryan Dye, Symantec SVP Information Security, stated, “[antivirus] is dead”. Despite these declarations, antivirus remains a billion-dollar industry with millions of users, whether they are individuals, ... Read More
Malware vs. Antivirus: the never-ending story (Part II)
In 2008, Eva Chen, Trend Micro’s CEO declared: “In the antivirus business, we have been lying to customers for 20 years”. Seven years later, Bryan Dye, Symantec SVP Information Security, stated, “[antivirus] is dead”. Despite these declarations, antivirus remains a billion-dollar industry with millions of users, whether they are individuals, ... Read More