Recent blog posts

Understanding the LockBit Ransomware Breach
SBT Content Engineers 02/06/2025

Understanding the LockBit Ransomware Breach

The recent LockBit ransomware breach saw attackers deface its affiliate panel and leak an SQL database, exposing victim data, negotiation tactics, and operational missteps. It explores ties to the Everest hack, LockBit’s RaaS model, and affiliate errors, offering a glimpse into the group’s vulnerabilities.

Meet João Rodrigues: SBT’s Director of Web Shaping Our Digital Future
Duncan Whitley 30/06/2025

Meet João Rodrigues: SBT’s Director of Web Shaping Our Digital Future

We’re thrilled to introduce João Rodrigues, Security Blue Team’s Director of Web, a driving force behind the secure, seamless platforms that define our cybersecurity training experience. For those familiar with João through his pivotal work on our BTLO platform or his involvement in SBT’s CTF events, this is a fresh...

All posts

Digging into Python's involvement in ransomware threats
Luis Suastegui 01/08/2024

Digging into Python's involvement in ransomware threats

This post will delve into Python's involvement in ransomware, focusing on Cryptonite ransomware. We will explore how Python's ease of use and versatility facilitate the development of this digital threat, examine its mechanics, and discuss how the relative ease of decompiling Python code introduces new risks.

Framework for Mapping Insider Threat Launches
Melissa Boyle 29/07/2024

Framework for Mapping Insider Threat Launches

The brainchild of James Weston, Forensics and Investigations Manager at a global telecommunications company, and Security Blue Team founder, Joshua Beaman, the Insider Threat Matrix™ (ITM) was born out of a lack of any formalized framework for discussing insider threat.

Windows Logging: A Guide to Enhanced Visibility
Aditya Rai 25/07/2024

Windows Logging: A Guide to Enhanced Visibility

Knowing what log data to collect and where to collect it from is key to gaining a comprehensive view of your environment and, in turn, enhancing security. Let's examine further.

Harness the Power of Scripting: Why PowerShell is a MUST in Cybersecurity!
Malik Girondin 17/07/2024

Harness the Power of Scripting: Why PowerShell is a MUST in Cybersecurity!

In this article, we will explore the thought of utilizing PowerShell in cybersecurity. Is it a MUST or a bust? Before you jump to a conclusion, please, read the information provided in this blog. Then, truly, you can determine if this is for you or not. Let’s dive right into...