Security Blue Team Releases First-of-its-kind Ransomware Course
From understanding the foundations of ransomware to engaging in negotiation simulations, students will gain practical insights into managing cyber extortion scenarios.
From understanding the foundations of ransomware to engaging in negotiation simulations, students will gain practical insights into managing cyber extortion scenarios.
This blog series will explore Security Blue Team's adventure into the reverse engineering of a novel SmartLoader malware variant. This...
We need a suitable environment to detonate the malware in a repeatable fashion. This environment should allow us to substitute...
Picture a team diving into a winter wonderland where snowmobiles hunt the Northern Lights, huskies charge through snowy trails, and drinks come in glasses chiseled from ice. That’s what SBT got up to during our annual Global Connect, a company get-together that took us from Stockholm to the icy wilds...
NXLog is an open-source, multi-platform log management tool designed to collect, process, and forward log messages. It can gather logs from various sources across the network, including systems, applications, and devices.
In this blog, we explore Windows Scheduled Tasks—a tool designed for automating system jobs that, if misused, can become a hidden avenue for threat actors.
Honeypots are intriguing tools in cybersecurity, designed to attract cyber attackers and analyze their methods. We explore the two main types, as well as the pros and cons of using them as part of your security strategy.
With the simplicity and efficiency that cloud storage offers, it also comes with the risk of misconfigurations which can lead to serious consequences for organizations.
Given the complexity of obtaining and evaluating data from cloud services, cloud storage forensics is now recognized as a key component of digital investigations in today's digitally-dependent environment. Among them, Google Drive is an excellent choice for forensic investigation because of its extensive usage and the variety of data it...
Recently there have been some high-profile campaigns around subdomain hijacking, but what is it exactly?