Recent blog posts

Understanding Red Team Roles
Joshua Beaman 29/07/2025

Understanding Red Team Roles

There are a wide range of offensive cybersecurity, or "red team", roles in our industry. In this blog post we'll introduce you to the following: Penetration Tester, Web Application Tester, Vulnerability Assessment Analyst, Exploit Developer, and Red Team Operator.

Understanding the LockBit Ransomware Breach
SBT Content Engineers 02/06/2025

Understanding the LockBit Ransomware Breach

The recent LockBit ransomware breach saw attackers deface its affiliate panel and leak an SQL database, exposing victim data, negotiation...

Meet Adam, SBT’s Student Support Lead Championing Learners
Duncan Whitley 28/07/2025

Meet Adam, SBT’s Student Support Lead Championing Learners

Get to know Adam Suleman, Security Blue Team’s Student Support Lead, whose empathy and expertise create exceptional cybersecurity training experiences. From guiding diverse learners to refining support systems, Adam’s journey from a BTL1 student to a key SBT team member showcases his commitment to student success. Dive into his story,...

All posts

ChatGPT for Offensive and Defensive Cybersecurity
Melissa Boyle 21/02/2024

ChatGPT for Offensive and Defensive Cybersecurity

There has been a lot of talk recently about ChatGPT and its implications for a wide range of industries. Potential applications are vast, including creative design, technical writing, and programming. In this article, we will explore some of the potential applications within the realm of cybersecurity — as well as...

Lace Tempest: SysAid On-Prem Software CVE-2023–47246 Vulnerability
Joshua Beaman 21/02/2024

Lace Tempest: SysAid On-Prem Software CVE-2023–47246 Vulnerability

In this blog post, we’ll investigate the fascinating details regarding CVE-2023–47246 SysAid On-Prem Software Vulnerability and uncover how attackers are compromising endpoints. This blog will also discuss how Lace Tempest weaponizes GraceWire Loader or Turtle Loader, and how to recognize the indicators of compromise (IOCs) from active exploitation.

Q&A with Wouter van den Bergh
Melissa Boyle 15/04/2023

Q&A with Wouter van den Bergh

Wouter van den Bergh is the volunteer teacher delivering our BTL1 certification to students taking part in Cyberworkplace’s new training initiative.