Security Blue Team Releases First-of-its-kind Ransomware Course
From understanding the foundations of ransomware to engaging in negotiation simulations, students will gain practical insights into managing cyber extortion scenarios.
From understanding the foundations of ransomware to engaging in negotiation simulations, students will gain practical insights into managing cyber extortion scenarios.
This blog series will explore Security Blue Team's adventure into the reverse engineering of a novel SmartLoader malware variant. This...
We need a suitable environment to detonate the malware in a repeatable fashion. This environment should allow us to substitute...
Picture a team diving into a winter wonderland where snowmobiles hunt the Northern Lights, huskies charge through snowy trails, and drinks come in glasses chiseled from ice. That’s what SBT got up to during our annual Global Connect, a company get-together that took us from Stockholm to the icy wilds...
Yesterday’s global IT outage, caused by a faulty update from CrowdStrike caused thousands of Windows hosts to experience a Blue Screen of Death (BSOD).
In this article, we will explore the thought of utilizing PowerShell in cybersecurity. Is it a MUST or a bust? Before you jump to a conclusion, please, read the information provided in this blog. Then, truly, you can determine if this is for you or not. Let’s dive right into...
Three busy days, one full van of merch, and nearly £50k worth of training given away. Infosec Europe may have been a couple of weeks ago, but we’re still buzzing!
Are you seeking resources to understand and make the best use of Splunk? Well, you are at the right place. This blog aims to guide you through the essentials of Splunk, including the practical use of Search Processing Language (SPL queries).
In this blog post, we will discuss a technique often employed by red teamers and threat actors during the lateral movement stage of the cyber kill chain, called RID hijacking.
How often do we witness the blend of innovation and generosity in the tech world? Google's latest contribution to the open-source community, Magika, serves as a fascinating case study in this regard.