cybersecurity

SAIL-2025

Solving the Openfire Lab Blue team challenge

As a cybersecurity analyst, you are tasked with investigating a data breach targeting your organization’s Openfire messaging server.
Attackers have exploited a vulnerability in the server, compromising sensitive communications and potentially exposing critical data.

Read More
ShadowCitadel cover

Solving the ShadowCitadel Lab Blue team challenge 🫆

Today, we dive into a host-based forensics investigation − a curious case of a breach inside the enterprise environment of a company called TechSynergy.
They have detected an anomaly after an employee engaged with an unexpected email attachment. This triggered a series of covert operations within the network, including unusual account activity and system alterations.

Read More
Sophisticado

How to prevent token misuse in LLM integrations

LLMs are powerful. And expensive. Every token counts, and if you’re building something that uses an LLM API (Claude, OpenAI, Gemini or PaLM, Mistral, etc.), malicious users can abuse it to burn through your credits. This is especially true for apps that take user input and feed it to the model. The trick is that […]

Read More
Bars in Dublin at dusk

Solving the XLMRat Blue team challenge

Today we’re looking at the XLMRat malware. It is a remote access trojan (hence the RAT part) built to be small, sneaky, and stupidly persistent. It typically rides in via phishing or social engineering, often disguised as something mundane, like a JPG or TXT file. It targets Windows systems and speaks fluent PowerShell. It’s popular […]

Read More
Blue sky with a blue plane

Solving the BlueSky Ransomware Blue team challenge

Today we’re looking at the BlueSky ransomware, a strain of malicious software that encrypts files on a victim’s system, rendering them inaccessible until a ransom is paid. First detected in June 2022, it shares similarities with other notorious ransomware families like Conti and Babuk.  BlueSky spreads through methods such as phishing emails, malicious links, and network […]

Read More
DanaBot obfuscated JS file

Solving the DanaBot Blue team challenge

In this blog post, we’ll walk through a Blue Team lab challenge hosted by CyberDefenders, specifically investigating a breach scenario involving DanaBot malware. The challenge is presented by CyberDefenders (https://cyberdefenders.org) and can be found here: https://cyberdefenders.org/blueteam-ctf-challenges/danabot. Note: This post is not sponsored by or affiliated with CyberDefenders. Initially, I knew very little about DanaBot. Turns out […]

Read More

The unboring NIST SP 800-190

When most of us hear “NIST guidelines”, our first reaction might be “another boring PDF I’ll never open again“. My first encounter with NIST Special Publication 800-190 happened when I was studying for the GIAC GCSA exam, which is focused on DevSecOps and container security. The SP 800-190 is refreshingly different. It isn’t just another […]

Read More
Green parrot on a tree having lunch

Passkeys – the future of secure authentication

As a long-term fan of Yubikeys, I quickly got curious about this relatively new concept called “passkeys“. Big companies like Apple, Amazon, and Mastercard are nudging their users to adopt passkeys and use them instead of passwords. The “instead of passwords” part really got me curious! Since forever, passwords have been a part of our […]

Read More
Landscape photo of Scottish Highlands

Say “yes” to SBOMs!

Picture this: your software application is running smoothly in production, serving thousands of users. Then, you hear about a new critical vulnerability affecting open-source libraries, and panic sets in. Is your application exposed? If so, which part is at risk? Without a clear map of your software’s components, answering these questions can feel like searching […]

Read More
Amsterdam by night | Security awareness program

Getting it right: security awareness program on a budget

Introducing a Security Awareness program is becoming increasingly important for organizations as the cybersecurity landscape changes rapidly. This undertaking becomes even more challenging if the security team is new to the organization and operates on a limited budget. In this blog post, I share my experience implementing a security awareness program enriched by extensive research […]

Read More