Recent blog posts

Understanding the LockBit Ransomware Breach
SBT Content Engineers 02/06/2025

Understanding the LockBit Ransomware Breach

The recent LockBit ransomware breach saw attackers deface its affiliate panel and leak an SQL database, exposing victim data, negotiation tactics, and operational missteps. It explores ties to the Everest hack, LockBit’s RaaS model, and affiliate errors, offering a glimpse into the group’s vulnerabilities.

Meet João Rodrigues: SBT’s Director of Web Shaping Our Digital Future
Duncan Whitley 30/06/2025

Meet João Rodrigues: SBT’s Director of Web Shaping Our Digital Future

We’re thrilled to introduce João Rodrigues, Security Blue Team’s Director of Web, a driving force behind the secure, seamless platforms that define our cybersecurity training experience. For those familiar with João through his pivotal work on our BTLO platform or his involvement in SBT’s CTF events, this is a fresh...

All posts

SBT Wrapped: A Year in Stats
Melissa Boyle 18/12/2024

SBT Wrapped: A Year in Stats

Welcome to the very first SBT Wrapped, where we’ll be sharing some stats from the past year.

Forensics 101: Live Acquisition USB and Digital Triaging with Kape
Malik Girondin 09/12/2024

Forensics 101: Live Acquisition USB and Digital Triaging with Kape

Live acquisition is a computer forensics technique that involves collecting data from a running computer system, rather than one that is powered off or dormant. The goal is to capture volatile forensic data, such as that in the main memory (RAM) while minimizing any impact on the system’s integrity. This...

Command and Control Chaos
Aditya Rai 13/11/2024

Command and Control Chaos

A Command and Control, also known as a C2 or C&C server, is an essential tool for cybercriminals and hackers, acting as the central hub for managing and coordinating malicious activities such as data breaches, malware distribution, and cyberattacks.