Recent blog posts

Understanding the LockBit Ransomware Breach
SBT Content Engineers 02/06/2025

Understanding the LockBit Ransomware Breach

The recent LockBit ransomware breach saw attackers deface its affiliate panel and leak an SQL database, exposing victim data, negotiation tactics, and operational missteps. It explores ties to the Everest hack, LockBit’s RaaS model, and affiliate errors, offering a glimpse into the group’s vulnerabilities.

Meet João Rodrigues: SBT’s Director of Web Shaping Our Digital Future
Duncan Whitley 30/06/2025

Meet João Rodrigues: SBT’s Director of Web Shaping Our Digital Future

We’re thrilled to introduce João Rodrigues, Security Blue Team’s Director of Web, a driving force behind the secure, seamless platforms that define our cybersecurity training experience. For those familiar with João through his pivotal work on our BTLO platform or his involvement in SBT’s CTF events, this is a fresh...

All posts

Blind Eagle: How RATs Are Tightening Their Grip on Latin America
Renmarc Andrada 13/09/2024

Blind Eagle: How RATs Are Tightening Their Grip on Latin America

It’s not every day you see an eagle hunting with a RATs or Remote Access Trojans, but in Latin America's cyber landscape, this unusual partnership is causing serious trouble. In this blog, we'll dive into the recent campaign by the hacking group Blind Eagle, exploring their tactics, techniques, and procedures...

Security Blue Team at Black Hat USA: Our Roundup
Duncan Whitley 22/08/2024

Security Blue Team at Black Hat USA: Our Roundup

For the first time, we at Security Blue Team had the honor of sponsoring Black Hat USA in Las Vegas. The event, which ran 7-8 August, is one of the premier information security conferences globally, drawing in cybersecurity professionals, researchers, and enthusiasts from all over the world.

Steal ‘em Eggs: Golden Chicken Hatches More_eggs Backdoor
Renmarc Andrada 16/08/2024

Steal ‘em Eggs: Golden Chicken Hatches More_eggs Backdoor

"Why did the chicken cross the road?" This common riddle is typically answered with, "To get to the other side." Interestingly, this simple joke metaphorically aligns with the tactics, techniques, and procedures (TTPs) of the threat actor we will be discussing, specifically how they infiltrate their targets' environments to steal...

Day in the Life of a Content Engineer
Malik Girondin 09/08/2024

Day in the Life of a Content Engineer

We explore what it means to be a content engineer, an exciting career emerging within the cybersecurity industry. This piece is authored by our esteemed Defensive Content Engineer, Malik Girondin. With his experience as a cybersecurity instructor for various organizations and as a YouTuber, he has established numerous labs to...