Security Blue Team Releases First-of-its-kind Ransomware Course
From understanding the foundations of ransomware to engaging in negotiation simulations, students will gain practical insights into managing cyber extortion scenarios.
From understanding the foundations of ransomware to engaging in negotiation simulations, students will gain practical insights into managing cyber extortion scenarios.
This blog series will explore Security Blue Team's adventure into the reverse engineering of a novel SmartLoader malware variant. This...
We need a suitable environment to detonate the malware in a repeatable fashion. This environment should allow us to substitute...
Picture a team diving into a winter wonderland where snowmobiles hunt the Northern Lights, huskies charge through snowy trails, and drinks come in glasses chiseled from ice. That’s what SBT got up to during our annual Global Connect, a company get-together that took us from Stockholm to the icy wilds...
As organizations increasingly embrace remote work and flexible environments, the traditional boundaries of the workplace are rapidly dissolving.
Think of threat hunting and threat intelligence as the syrup to your organization’s cybersecurity pancakes. Sure, pancakes are great on their own, but they truly come to life when you add that sweet, golden syrup.
It’s not every day you see an eagle hunting with a RATs or Remote Access Trojans, but in Latin America's cyber landscape, this unusual partnership is causing serious trouble. In this blog, we'll dive into the recent campaign by the hacking group Blind Eagle, exploring their tactics, techniques, and procedures...
Picture this: a trusted employee has been leaking sensitive information for months—without your knowledge. Now, your organization is at risk, and the damage is done. This scenario, sadly, is not uncommon.
In 2024, today’s digital age, the security of email communications is more critical than ever.
For the first time, we at Security Blue Team had the honor of sponsoring Black Hat USA in Las Vegas. The event, which ran 7-8 August, is one of the premier information security conferences globally, drawing in cybersecurity professionals, researchers, and enthusiasts from all over the world.