Guest Post | Advt. | Query:

Blueliv Annual Cyberthreat Report advises increased intelligence sharing and cross-industry collaboration

Malware advances no longer focused on ‘traditional’ enterprise targets as cybercriminals expand their scope

  • Almost 2 billion exposed credentials detected
  • 140% increase in TOR domains used as crimeservers 2016-2017
  • 2 million stolen credit card details found, 40% of which from four major American banks
  • Improved malware complexity, obfuscation and lateral movement techniques
  • Variants of Trickbot the most commonly used webinject detected

7 March, 2018 – Barcelona, Spain – Blueliv, Europe’s leading provider of enterprise-class cyberthreat intelligence solutions, has today released its Annual Cyberthreat Report, compiling actionable intelligence from Threat Compass with expert insight from its analyst team. The report found that malware variants previously focused on the financial sector are now successfully attacking non-banking targets too, concluding that a higher level of collaboration and intelligence-sharing between industries is ever-more crucial in the fight against cybercrime.

As the ‘public profile’ of cybercrime continues to increase, enterprises are encouraged to look at how they keep their businesses and customers safe by sharing intelligence, best practice and defense measures.

Ramon Vicens, CTO, Blueliv, commented, “When cyberattacks in one industry make headlines, organizations in other industries start to take notice. And when other organizations take notice and start taking proactive steps to strengthen their security posture, that is good news for all of us: the fight against cybercrime is a collaborative effort.”

The Blueliv Annual Cyberthreat Report reflects on notable cybersecurity incidents in 2017 to make informed predictions about the current state of play and areas which require immediate attention in the coming months. Trends identified in the report include:

  • Attacks are discriminating much less by sector than in previous years. Any company holding PII is a target
  • Corporate intrusion in one industry will have a positive effect on other industries in terms of strengthening security posture
  • GDPR will mark a fundamental shift for organizations, but also for the bad guys: even the threat of a reported data breach will become increasingly lucrative
  • AI-powered attacks are increasing in scope and complexity, reflecting advances in AI-powered cyberdefense
  • Self-spreading ransomware which grabbed the headlines in 2017 will be overtaken by cryptojacking attacks

Other key findings include an overview of increased malware sophistication, with improved complexity, encryption, obfuscation and lateral movement techniques used by adversaries. These advances are put into context through an analysis of major data breaches and their implications for the organizations involved and the world at large. The report concludes with guidance around what organizations should be doing to protect themselves.

The report can be downloaded at the following link:

Blueliv is leading a new wave of proactive, real-time threat monitoring that protects organizations from the outside in, radically reducing attack success rates and improving incident response performance through fresh, actionable intelligence. The in-house team is bolstered by the Blueliv Threat Exchange Network, a global community of thousands of security experts united in the fight against cybercrime.

About Blueliv
Blueliv is a leading cyberthreat intelligence provider with a world-class in-house Labs team. We scour the web, the deep web and the dark internet to deliver fresh, automated and actionable threat intelligence to organizations across multiple industries to protect their networks from the outside in. Our scalable cloud-based platform turns global threat data into sophisticated and relevant intelligence, enabling organizations to save time and resource by improving their incident response performance and empowering their Security teams with real-time intelligence. Quantify and qualify malicious attack vectors with our plug and play MRTI feed; delivered in STIX/TAXII standard, integration is easy. The Blueliv Threat Exchange Network is a strong collaborative community of security researchers and malware analysts. We want you to be a part of it – join Blueliv is a Gartner Cool Vendor 2015 and Go-Ignite winner 2016.

Ludovic Pivetal, Marketing Director, Blueliv
+34 933 09 61 00

Josh Hoppen, Communications lead, Blueliv
+34 612 28 72 64

Have any Question or Comment?

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Twitter @TechRecur

…… ……. … …

……… …. …….



For the 2012 MLB period, we found an totals forecast Joao’s Renowned Over/Under João Zorro Gonçalves, Zcode Totals Pro, System of the time with progressions that have been successful over 98 98% ... We eventually perfected our over/under program ( Zcodesystemexclusive ), although it h-AS has brought years of investigation. Five Steps to Making a Winning MLB Method: 1. Execute appropriate cash management tools. 2. MLB rules that are comprehend. 3.Extensive testing back to make sure successful longterm results ...


There is always a challenge when you're dealing with the Foreign Exchange Market. That's just the nature of the beast. The best thing you can do is to learn about how the market operates as a whole so that you will be ready to meet these challenges. iq option penipu Never be misled by any profit gains in binary options. This is the number-one way traders end up losing their money and ultimately failing. Remember that the same things that make you laugh can make you cry in this market, and you can lose that $700.


Learning Polish has never been this fun and easy as with our podcasts Learn Polish with Polishpod101 Start today and become conversational in Polish in no time


The Best Website Agen Poker Resmi Terpercaya come join


Do you need edmonton phone systems service ? Call complete communications today!

……… ……… .


High-tech solutions for easy start-up of your IPTV/OTT-business