Recent blog posts

Meet Reece: SBT’s Corporate Sales Manager Leading with Passion
Duncan Whitley 16/05/2025

Meet Reece: SBT’s Corporate Sales Manager Leading with Passion

Join us as we introduce Reece, Security Blue Team’s Corporate Sales Manager, whose leadership and passion drive our sales team to connect clients with top cybersecurity training. From his unexpected start at SBT to his love for travel and comics, discover Reece’s journey and what makes him a key player...

Understanding the LockBit Ransomware Breach
SBT Content Engineers 02/06/2025

Understanding the LockBit Ransomware Breach

The recent LockBit ransomware breach saw attackers deface its affiliate panel and leak an SQL database, exposing victim data, negotiation tactics, and operational missteps. It explores ties to the Everest hack, LockBit’s RaaS model, and affiliate errors, offering a glimpse into the group’s vulnerabilities.

All posts

Forwarding Windows Logs to Syslog using NXLog Tool
John Jonusauskas 29/05/2024

Forwarding Windows Logs to Syslog using NXLog Tool

NXLog is an open-source, multi-platform log management tool designed to collect, process, and forward log messages. It can gather logs from various sources across the network, including systems, applications, and devices.

Unveiling Intelligence through Honeypots' Cyber Deception
Luis Suastegui 10/05/2024

Unveiling Intelligence through Honeypots' Cyber Deception

Honeypots are intriguing tools in cybersecurity, designed to attract cyber attackers and analyze their methods. We explore the two main types, as well as the pros and cons of using them as part of your security strategy.

Cloud Surfing: Riding the Waves of Google Drive Forensics
Renmarc Andrada 18/04/2024

Cloud Surfing: Riding the Waves of Google Drive Forensics

Given the complexity of obtaining and evaluating data from cloud services, cloud storage forensics is now recognized as a key component of digital investigations in today's digitally-dependent environment. Among them, Google Drive is an excellent choice for forensic investigation because of its extensive usage and the variety of data it...