Recent blog posts

SOC Metrics for Finance: From Security Operations to Risk Insight and Business Impact
Catherine Southwick 28/04/2026

SOC Metrics for Finance: From Security Operations to Risk Insight and Business Impact

SOC metrics like alerts triaged and threats detected only tell part of the story, especially in financial services where performance is measured in risk, exposure, and business impact. This article explores how to reframe key metrics such as MTTR, containment time, and risk reduction to better align with financial outcomes,...

Locked Shield 26 | Supporting NATO on a multinational exercise
SBT Content Engineers 01/05/2026

Locked Shield 26 | Supporting NATO on a multinational exercise

Locked Shields is as close as it gets to a real-world cyber war without it actually happening. This post breaks down what it’s like to support NATO’s largest live-fire exercise, the scenarios we built, and what training at that scale really looks like when pressure, complexity, and realism all come...

All posts

Blind Eagle: How RATs Are Tightening Their Grip on Latin America
Renmarc Andrada 13/09/2024

Blind Eagle: How RATs Are Tightening Their Grip on Latin America

It’s not every day you see an eagle hunting with a RATs or Remote Access Trojans, but in Latin America's cyber landscape, this unusual partnership is causing serious trouble. In this blog, we'll dive into the recent campaign by the hacking group Blind Eagle, exploring their tactics, techniques, and procedures...

Security Blue Team at Black Hat USA: Our Roundup
Duncan Whitley 22/08/2024

Security Blue Team at Black Hat USA: Our Roundup

For the first time, we at Security Blue Team had the honor of sponsoring Black Hat USA in Las Vegas. The event, which ran 7-8 August, is one of the premier information security conferences globally, drawing in cybersecurity professionals, researchers, and enthusiasts from all over the world.

Steal ‘em Eggs: Golden Chicken Hatches More_eggs Backdoor
Renmarc Andrada 16/08/2024

Steal ‘em Eggs: Golden Chicken Hatches More_eggs Backdoor

"Why did the chicken cross the road?" This common riddle is typically answered with, "To get to the other side." Interestingly, this simple joke metaphorically aligns with the tactics, techniques, and procedures (TTPs) of the threat actor we will be discussing, specifically how they infiltrate their targets' environments to steal...