HTB > Blue Teaming
21% of security teams train just once a year—here’s how to fix that
1 month 1 week ago
In this blog, we'll explore the main reasons why security teams fall behind, what you can do to fix it, and how to build a culture of continuous learning.
From Theory to Action: How dynamic benchmarking transforms cybersecurity readiness
1 month 3 weeks ago
Discover how dynamic benchmarking and CTF exercises can strengthen your security team in our Masterclass webinar, From Theory to Action. Stay ahead of evolving cyber threats!
Why security teams struggle to train—and how to fix it
1 month 4 weeks ago
Cybersecurity teams struggle to train amid constant threats. This blog explores the challenges and solutions to making structured training a priority.
How to use SmartScreen logs to find evidence of execution and user activity analysis
2 months 3 weeks ago
CyberJunkie walks us through a new detection technique he uncovered using Windows SmartScreen Debug Event Logs. Follow this step-by-step guide to see how it works.
Memory dump analysis with Signal decryption
5 months ago
A deep-dive into Signal’s move to safeStorage API and how an HTB forensic content engineer creates a CTF Challenge.
New Sherlocks updates: Academy recommendations, CPE credits (and more!)
5 months 3 weeks ago
Ready for a more rewarding dive into your blue team investigations? Well, we have made new updates to Sherlocks that will give you momentum and a bonus to time well spent.
Malware analysis for beginners (step-by-step)
8 months ago
Get familiar with industry-standard tools and methodologies to identify, understand, and detect malware threats.
5 Active Directory misconfigurations (& how they're exploited)
8 months 1 week ago
Audit your AD environment for misconfigurations (and attacks) that can lead to severe consequences when exploited by malicious actors.
NTDS dumping attack detection
8 months 3 weeks ago
Learn how to detect NTDS dumping attacks in issue five of a special series on critical Active Directory (AD) attack detections & misconfigurations.
Essential SOC analyst tools (+ insights from real blue teamers)
9 months ago
How to get good at these fundamental SOC tools and their related skills.
NTLM relay attack detection
9 months 1 week ago
Learn how to detect NTLM relay attacks in part four of a special series on critical Active Directory (AD) attack detections & misconfigurations.
LLMNR poisoning attack detection
9 months 3 weeks ago
Learn how to detect LLMNR poisoning attacks in part three of a special five-part series on critical Active Directory (AD) attack detections & misconfigurations
AS-REP roasting detection
9 months 4 weeks ago
Learn how to detect AS-REP roasting attacks in part two of a special five-part series on critical Active Directory (AD) attack detections & misconfigurations.
Kerberoasting attack detection
11 months ago
Learn how to detect Kerberoast attacks in part one of a special five-part series on critical Active Directory (AD) attack detections & misconfigurations.
A step-by-step guide to crafting an incident response plan
11 months 3 weeks ago
Incident response plans lay the foundations for a defensive team’s actions in the face of an incident, making them essential for speedy and effective response.
5 Windows event log analysis tools (for beginner blue teamers)
1 year ago
Windows event logs are the gateway to understanding suspicious activity, making these event log analysis tools essential for beginner blue teamers.
Beat SOC analyst burnout with better L&D
1 year ago
SOC analyst burnout is rife thanks to the “always-on” nature of the role paired with a lack of training. Tackle this major issue with effective L&D.
Guarding against SQL injection: Techniques to enhance code security
1 year ago
Learn how to avoid these common vulnerabilities in your applications with our SQL injection attack examples.
Decoding Windows event logs: A definitive guide for incident responders
1 year 1 month ago
Windows event logs can provide valuable insights when piecing together an incident or suspicious activity, making them crucial for analysts to understand.
Checked
6 hours 52 minutes ago
All the latest news and insights about cybersecurity from Hack The Box. Hacking trends, insights, interviews, stories, and much more
HTB > Blue Teaming feed