Security Blue Team Releases First-of-its-kind Ransomware Course
From understanding the foundations of ransomware to engaging in negotiation simulations, students will gain practical insights into managing cyber extortion scenarios.
From understanding the foundations of ransomware to engaging in negotiation simulations, students will gain practical insights into managing cyber extortion scenarios.
This blog series will explore Security Blue Team's adventure into the reverse engineering of a novel SmartLoader malware variant. This...
We need a suitable environment to detonate the malware in a repeatable fashion. This environment should allow us to substitute...
Picture a team diving into a winter wonderland where snowmobiles hunt the Northern Lights, huskies charge through snowy trails, and drinks come in glasses chiseled from ice. That’s what SBT got up to during our annual Global Connect, a company get-together that took us from Stockholm to the icy wilds...
It started like many incident response cases: an urgent Security Operation Center (SOC) alert.
Welcome to our first Faces of SBT blog post, where we’ll be showcasing a member of our team and giving you a behind-the-scenes look at what it’s like to work at SBT. First up is Trevor, our Director of Cloud Services.
Digital forensics is a niche field within cybersecurity, and its subfield, “Browser Forensics,” is less known. Despite that, it is a crucial skill as it can provide abundant information to investigators.
Welcome to the very first SBT Wrapped, where we’ll be sharing some stats from the past year.
We decided to experiment: How effective is data exfiltration via RDP?
Live acquisition is a computer forensics technique that involves collecting data from a running computer system, rather than one that is powered off or dormant. The goal is to capture volatile forensic data, such as that in the main memory (RAM) while minimizing any impact on the system’s integrity. This...