Recent blog posts

Meet Duncan: One of SBT’s Marketing Executives Bringing Stories to Life
Duncan Whitley 25/03/2026

Meet Duncan: One of SBT’s Marketing Executives Bringing Stories to Life

Get to know Duncan Whitley, one of Security Blue Team’s Marketing Executives, who creates blog posts, newsletters, emails, and ads to deliver genuinely useful cybersecurity content. From a background shaped by gaming and technology to a career in marketing, Duncan shares why he values clear, helpful communication and enjoys seeing...

Understanding the Ransomware Lifecycle
Ben Gonsalves 14/04/2026

Understanding the Ransomware Lifecycle

Ransomware attacks rarely happen all at once. They follow a series of stages that unfold over time, from initial access to data exfiltration and encryption. Understanding this lifecycle helps analysts spot threats earlier, respond more effectively, and focus on the stages where intervention makes the biggest difference.

All posts

The MacGyver Escape: How to Transfer Files from a Restricted Windows Computer
Luis Suastegui 26/03/2025

The MacGyver Escape: How to Transfer Files from a Restricted Windows Computer

Have you ever needed to transfer data from one computer to another but found yourself blocked by strict security policies? Perhaps you cannot connect any USB devices, most of your programs (including PowerShell and Command Prompt) are disabled, and internet access is heavily restricted.

Security Blue Team’s Global Connect: A Chilly Team Adventure in Lapland
Duncan Whitley 14/03/2025

Security Blue Team’s Global Connect: A Chilly Team Adventure in Lapland

Picture a team diving into a winter wonderland where snowmobiles hunt the Northern Lights, huskies charge through snowy trails, and drinks come in glasses chiseled from ice. That’s what SBT got up to during our annual Global Connect, a company get-together that took us from Stockholm to the icy wilds...

JIT Happens: Exposing LuaJIT Malware in the Wild
SBT Content Engineers 28/02/2025

JIT Happens: Exposing LuaJIT Malware in the Wild

This blog series will explore Security Blue Team's adventure into the reverse engineering of a novel SmartLoader malware variant. This malware was discovered during our research into Belsen Group's high-profile FortiGate leak. This leak was advertised as containing a list of affected companies with associated configuration data from their FortiGate...

JIT Happens: Creating a malware analysis lab for Smartloader
SBT Content Engineers 28/02/2025

JIT Happens: Creating a malware analysis lab for Smartloader

We need a suitable environment to detonate the malware in a repeatable fashion. This environment should allow us to substitute our mock APIs and host to ensure the malware operates as close to real as possible.

Black Basta: Unmasking the Ransomware Gang Through Leaked Chat Logs
Luis Suastegui 21/02/2025

Black Basta: Unmasking the Ransomware Gang Through Leaked Chat Logs

The Black Basta ransomware gang recently made headlines for all the wrong reasons when someone using the online handle “ExploitWhispers” shared internal chat logs of the group with the public — close to a year’s worth of messages in a JSON file.