Recent blog posts

Building a SOC That Scales Without Burning People Out
Joanne Morley 26/01/2026

Building a SOC That Scales Without Burning People Out

Burnout in SOCs is rarely about individual resilience and more often about how work is designed and sustained. This article explores how alert noise, context switching, and constant vigilance quietly erode performance over time, and what resilient SOCs do differently to protect judgement, focus, and long-term capability.

Meet Hari: One of SBT’s Project Managers Keeping Everything on Track
Duncan Whitley 26/01/2026

Meet Hari: One of SBT’s Project Managers Keeping Everything on Track

Meet Hari, one of Security Blue Team’s Project Managers, who helps turn complex initiatives into clear, well-coordinated outcomes. From supporting certification launches to keeping cross-functional teams aligned, Hari plays a key role in how SBT delivers at scale. Learn about her journey into cybersecurity, her passion for problem-solving, and how...

All posts

Steal ‘em Eggs: Golden Chicken Hatches More_eggs Backdoor
Renmarc Andrada 16/08/2024

Steal ‘em Eggs: Golden Chicken Hatches More_eggs Backdoor

"Why did the chicken cross the road?" This common riddle is typically answered with, "To get to the other side." Interestingly, this simple joke metaphorically aligns with the tactics, techniques, and procedures (TTPs) of the threat actor we will be discussing, specifically how they infiltrate their targets' environments to steal...

Day in the Life of a Content Engineer
Malik Girondin 09/08/2024

Day in the Life of a Content Engineer

We explore what it means to be a content engineer, an exciting career emerging within the cybersecurity industry. This piece is authored by our esteemed Defensive Content Engineer, Malik Girondin. With his experience as a cybersecurity instructor for various organizations and as a YouTuber, he has established numerous labs to...

Digging into Python's involvement in ransomware threats
Luis Suastegui 01/08/2024

Digging into Python's involvement in ransomware threats

This post will delve into Python's involvement in ransomware, focusing on Cryptonite ransomware. We will explore how Python's ease of use and versatility facilitate the development of this digital threat, examine its mechanics, and discuss how the relative ease of decompiling Python code introduces new risks.

Framework for Mapping Insider Threat Launches
Melissa Boyle 29/07/2024

Framework for Mapping Insider Threat Launches

The brainchild of James Weston, Forensics and Investigations Manager at a global telecommunications company, and Security Blue Team founder, Joshua Beaman, the Insider Threat Matrix™ (ITM) was born out of a lack of any formalized framework for discussing insider threat.

Windows Logging: A Guide to Enhanced Visibility
Aditya Rai 25/07/2024

Windows Logging: A Guide to Enhanced Visibility

Knowing what log data to collect and where to collect it from is key to gaining a comprehensive view of your environment and, in turn, enhancing security. Let's examine further.