Recent blog posts

Meet Duncan: One of SBT’s Marketing Executives Bringing Stories to Life
Duncan Whitley 25/03/2026

Meet Duncan: One of SBT’s Marketing Executives Bringing Stories to Life

Get to know Duncan Whitley, one of Security Blue Team’s Marketing Executives, who creates blog posts, newsletters, emails, and ads to deliver genuinely useful cybersecurity content. From a background shaped by gaming and technology to a career in marketing, Duncan shares why he values clear, helpful communication and enjoys seeing...

Understanding the Ransomware Lifecycle
Ben Gonsalves 14/04/2026

Understanding the Ransomware Lifecycle

Ransomware attacks rarely happen all at once. They follow a series of stages that unfold over time, from initial access to data exfiltration and encryption. Understanding this lifecycle helps analysts spot threats earlier, respond more effectively, and focus on the stages where intervention makes the biggest difference.

All posts

Google Casts a New Spell: Introducing Magik(a)
Renmarc Andrada 07/06/2024

Google Casts a New Spell: Introducing Magik(a)

How often do we witness the blend of innovation and generosity in the tech world? Google's latest contribution to the open-source community, Magika, serves as a fascinating case study in this regard.

Forwarding Windows Logs to Syslog using NXLog Tool
John Jonusauskas 29/05/2024

Forwarding Windows Logs to Syslog using NXLog Tool

NXLog is an open-source, multi-platform log management tool designed to collect, process, and forward log messages. It can gather logs from various sources across the network, including systems, applications, and devices.

Unveiling Intelligence through Honeypots' Cyber Deception
Luis Suastegui 10/05/2024

Unveiling Intelligence through Honeypots' Cyber Deception

Honeypots are intriguing tools in cybersecurity, designed to attract cyber attackers and analyze their methods. We explore the two main types, as well as the pros and cons of using them as part of your security strategy.

Cloud Surfing: Riding the Waves of Google Drive Forensics
Renmarc Andrada 18/04/2024

Cloud Surfing: Riding the Waves of Google Drive Forensics

Given the complexity of obtaining and evaluating data from cloud services, cloud storage forensics is now recognized as a key component of digital investigations in today's digitally-dependent environment. Among them, Google Drive is an excellent choice for forensic investigation because of its extensive usage and the variety of data it...