Security Blue Team Releases First-of-its-kind Ransomware Course
From understanding the foundations of ransomware to engaging in negotiation simulations, students will gain practical insights into managing cyber extortion scenarios.
From understanding the foundations of ransomware to engaging in negotiation simulations, students will gain practical insights into managing cyber extortion scenarios.
This blog series will explore Security Blue Team's adventure into the reverse engineering of a novel SmartLoader malware variant. This...
We need a suitable environment to detonate the malware in a repeatable fashion. This environment should allow us to substitute...
Picture a team diving into a winter wonderland where snowmobiles hunt the Northern Lights, huskies charge through snowy trails, and drinks come in glasses chiseled from ice. That’s what SBT got up to during our annual Global Connect, a company get-together that took us from Stockholm to the icy wilds...
A Command and Control, also known as a C2 or C&C server, is an essential tool for cybercriminals and hackers, acting as the central hub for managing and coordinating malicious activities such as data breaches, malware distribution, and cyberattacks.
After a quiet season, it looks like Cozy Bear is out of hibernation and back on the hunt.
Cybersecurity is the field where precision and quick thinking are crucial. The field where you have to get everything right while the hackers just have to be right once. The field where you are trying to keep pace with endless streams of tasks, alerts, and evolving threats.
Imagine you’re working in a company, and an insider threat tampers with a critical file, like a financial document or a system configuration file. If you don’t know who, when, or what was modified, you may not even realize something is wrong until it’s too late. This can lead to...
Cloud security involves a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing.
It's currently Cybersecurity Awareness Month, which gives us a great opportunity to reflect on how fundamental cybersecurity has become in today's world. This year, the theme is "Secure Our World," which perfectly captures the growing urgency for individuals and organizations to take action to protect their digital environments. In this...