Recent blog posts

Blind Eagle: How RATs Are Tightening Their Grip on Latin America
Renmarc Andrada 13/09/2024

Blind Eagle: How RATs Are Tightening Their Grip on Latin America

It’s not every day you see an eagle hunting with a RATs or Remote Access Trojans, but in Latin America's cyber landscape, this unusual partnership is causing serious trouble. In this blog, we'll dive into the recent campaign by the hacking group Blind Eagle, exploring their tactics, techniques, and procedures...

All posts

Blind Eagle: How RATs Are Tightening Their Grip on Latin America
Renmarc Andrada 13/09/2024

Blind Eagle: How RATs Are Tightening Their Grip on Latin America

It’s not every day you see an eagle hunting with a RATs or Remote Access Trojans, but in Latin America's cyber landscape, this unusual partnership is causing serious trouble. In this blog, we'll dive into the recent campaign by the hacking group Blind Eagle, exploring their tactics, techniques, and procedures...

Security Blue Team at Black Hat USA: Our Roundup
Duncan Whitley 22/08/2024

Security Blue Team at Black Hat USA: Our Roundup

For the first time, we at Security Blue Team had the honor of sponsoring Black Hat USA in Las Vegas. The event, which ran 7-8 August, is one of the premier information security conferences globally, drawing in cybersecurity professionals, researchers, and enthusiasts from all over the world.

Steal ‘em Eggs: Golden Chicken Hatches More_eggs Backdoor
Renmarc Andrada 16/08/2024

Steal ‘em Eggs: Golden Chicken Hatches More_eggs Backdoor

"Why did the chicken cross the road?" This common riddle is typically answered with, "To get to the other side." Interestingly, this simple joke metaphorically aligns with the tactics, techniques, and procedures (TTPs) of the threat actor we will be discussing, specifically how they infiltrate their targets' environments to steal...

Day in the Life of a Content Engineer
Malik Girondin 09/08/2024

Day in the Life of a Content Engineer

We explore what it means to be a content engineer, an exciting career emerging within the cybersecurity industry. This piece is authored by our esteemed Defensive Content Engineer, Malik Girondin. With his experience as a cybersecurity instructor for various organizations and as a YouTuber, he has established numerous labs to...