Fraud Management & Cybercrime , Next-Generation Technologies & Secure Development

From Cybercrime Zero to 'Hero' - Now Faster Than Ever

Cybercrime Service Economy Keeps Driving Easier Profits, Says Blueliv's Liv Rowley
Liv Rowley, threat intelligence analyst, Blueliv

No advanced hacking skills required: The burgeoning cybercrime-as-a-service economy continues to make it easy for aspiring cybercriminals to procure highly automated, easy-to-use and effective attack tools to fuel illicit profits, says Liv Rowley, a threat intelligence analyst at Blueliv.

See Also: Email Security from the Trenches

In a video interview with Information Security Media Group at RSA 2020, Rowley also discusses:

  • Cybercrime-as-a-service trends: No-distribute anti-virus scanners, the rise of resellers as well as specialization;
  • How criminals use customer service to differentiate their offerings;
  • When English- and Russian-language cybercrime innovations will spread to other regions.

Rowley is a threat intelligence analyst at Blueliv, where she focuses on researching the cybercriminal underground, including co-authoring the firm's latest "Dark Commerce" report on the cybercrime industry and its business models. She previously worked for U.S.-based threat intelligence startup Flashpoint.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.