Recent blog posts

Meet Reece: SBT’s Corporate Sales Manager Leading with Passion
Duncan Whitley 16/05/2025

Meet Reece: SBT’s Corporate Sales Manager Leading with Passion

Join us as we introduce Reece, Security Blue Team’s Corporate Sales Manager, whose leadership and passion drive our sales team to connect clients with top cybersecurity training. From his unexpected start at SBT to his love for travel and comics, discover Reece’s journey and what makes him a key player...

Understanding the LockBit Ransomware Breach
SBT Content Engineers 02/06/2025

Understanding the LockBit Ransomware Breach

The recent LockBit ransomware breach saw attackers deface its affiliate panel and leak an SQL database, exposing victim data, negotiation tactics, and operational missteps. It explores ties to the Everest hack, LockBit’s RaaS model, and affiliate errors, offering a glimpse into the group’s vulnerabilities.

All posts

Steal ‘em Eggs: Golden Chicken Hatches More_eggs Backdoor
Renmarc Andrada 16/08/2024

Steal ‘em Eggs: Golden Chicken Hatches More_eggs Backdoor

"Why did the chicken cross the road?" This common riddle is typically answered with, "To get to the other side." Interestingly, this simple joke metaphorically aligns with the tactics, techniques, and procedures (TTPs) of the threat actor we will be discussing, specifically how they infiltrate their targets' environments to steal...

Day in the Life of a Content Engineer
Malik Girondin 09/08/2024

Day in the Life of a Content Engineer

We explore what it means to be a content engineer, an exciting career emerging within the cybersecurity industry. This piece is authored by our esteemed Defensive Content Engineer, Malik Girondin. With his experience as a cybersecurity instructor for various organizations and as a YouTuber, he has established numerous labs to...

Digging into Python's involvement in ransomware threats
Luis Suastegui 01/08/2024

Digging into Python's involvement in ransomware threats

This post will delve into Python's involvement in ransomware, focusing on Cryptonite ransomware. We will explore how Python's ease of use and versatility facilitate the development of this digital threat, examine its mechanics, and discuss how the relative ease of decompiling Python code introduces new risks.

Framework for Mapping Insider Threat Launches
Melissa Boyle 29/07/2024

Framework for Mapping Insider Threat Launches

The brainchild of James Weston, Forensics and Investigations Manager at a global telecommunications company, and Security Blue Team founder, Joshua Beaman, the Insider Threat Matrix™ (ITM) was born out of a lack of any formalized framework for discussing insider threat.

Windows Logging: A Guide to Enhanced Visibility
Aditya Rai 25/07/2024

Windows Logging: A Guide to Enhanced Visibility

Knowing what log data to collect and where to collect it from is key to gaining a comprehensive view of your environment and, in turn, enhancing security. Let's examine further.