<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HTB Blog > Blue Teaming</title>
        <link>https://www.hackthebox.com/rss/blog/blue-teaming</link>
        <description>All the latest news and insights about cybersecurity from Hack The Box. Hacking trends, insights, interviews, stories, and much more</description>
        <language>en</language>
        <atom:link href="https://www.hackthebox.com/rss/blog/blue-teaming" rel="self" type="application/rss+xml" />
        <image>
            <url>
                https://www.hackthebox.com/images/landingv3/logo-htb-blog.svg
            </url>
            <title>HTB Blog > Blue Teaming</title>
            <link>https://www.hackthebox.com/rss/blog/blue-teaming</link>
        </image>
                    <item>
                <title>Detecting and investigating Command-and-Control (C2) Communication: A quick guide for security teams</title>
                <link>https://www.hackthebox.com/blog/detecting-investigating-c2-communication</link>
                <description>Learn how to detect and investigate command-and-control (C2) communication using log analysis, network traffic monitoring, EDR, and threat intelligence.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/qRdoVfNvAr4Pr8xNx0pSoxViWNrqSrBi.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Blue Teaming</category>
                <pubDate>Thu, 05 Feb 2026 14:18:42 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/detecting-investigating-c2-communication</guid>
            </item>
                    <item>
                <title>Cybersecurity blue team jobs in 2026: Roles, salaries, skills, and where to start</title>
                <link>https://www.hackthebox.com/blog/cybersecurity-blue-team-jobs-roles-salaries-skills</link>
                <description>Explore top blue team cybersecurity jobs in 2026, including SOC, IR, threat intel, and security engineering roles. Learn skills, career paths, and salaries.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/PV9yXUvxb8eOJje4JgXLsKQzORklK3fZ.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Blue Teaming</category>
                <pubDate>Fri, 02 Jan 2026 18:47:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/cybersecurity-blue-team-jobs-roles-salaries-skills</guid>
            </item>
                    <item>
                <title>Meet Windows Pwnbox: Same browser. Bigger playground. Better training.</title>
                <link>https://www.hackthebox.com/blog/windows-pwnbox-enterprise-cyber-training</link>
                <description>Launch Windows Pwnbox for enterprise teams. Train blue and red teams in native Windows and Linux environments, fully in-browser, with no setup or infrastructure overhead.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/4ioYPTVnGziiauxEAsqJAMGxPkhIiyZv.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Blue Teaming</category>
                <pubDate>Tue, 23 Dec 2025 03:13:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/windows-pwnbox-enterprise-cyber-training</guid>
            </item>
                    <item>
                <title>Your SOC vs. Reality: Why attackers are winning (and how Threat Range levels the battlefield)</title>
                <link>https://www.hackthebox.com/blog/threat-range-scenario-soc-readiness-ctem</link>
                <description>Sharpen SOC and DFIR readiness with Threat Range. See how real attacker tradecraft, CTEM alignment, and measurable performance metrics prepare teams for today’s breaches.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/pYeON28GVB7h4HgGo6g00ZdiTYy8eWLC.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Blue Teaming</category>
                <pubDate>Fri, 19 Dec 2025 14:21:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/threat-range-scenario-soc-readiness-ctem</guid>
            </item>
                    <item>
                <title>How to turn exposure data into real-world cyber readiness: 7 key takeaways from our webinar</title>
                <link>https://www.hackthebox.com/blog/turn-exposure-data-into-cyber-readiness-7-key-takeaways-threat-range</link>
                <description>Discover 7 key takeaways from our webinar on turning exposure data into real-world cyber readiness with Threat Range, our team-based simulation platform.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/2PCEYf4K03TjY9GEti13v6aicZsoZq1I.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Blue Teaming</category>
                <pubDate>Wed, 17 Dec 2025 12:01:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/turn-exposure-data-into-cyber-readiness-7-key-takeaways-threat-range</guid>
            </item>
                    <item>
                <title>Blue team resilience: The skills, simulations, and reporting SOCs actually want</title>
                <link>https://www.hackthebox.com/blog/blue-team-readiness-skills-soc-simulations</link>
                <description>Explore emerging blue team needs shaping enterprise security, including continuous readiness, real SOC simulations, improved defensive skills training, and modern performance measurement.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/Uxe0MYzwWbQf8cz0jSZqROt6qc8AbCnd.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Blue Teaming</category>
                <pubDate>Tue, 09 Dec 2025 09:36:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/blue-team-readiness-skills-soc-simulations</guid>
            </item>
                    <item>
                <title>Detecting USB-based cyber attacks: A guide</title>
                <link>https://www.hackthebox.com/blog/detecting-usb-cyber-attacks-guide</link>
                <description>Here’s how to protect your network from USB-based attacks, from detection techniques and forensics to prevention strategies to stop malware, data theft, and unauthorized access.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/A6vMeVIPzC6aM6GIO64IdaC4JwruYbp2.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Blue Teaming</category>
                <pubDate>Tue, 02 Dec 2025 16:47:34 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/detecting-usb-cyber-attacks-guide</guid>
            </item>
                    <item>
                <title>Stop the alert overload: How to train like you’re actually under attack</title>
                <link>https://www.hackthebox.com/blog/measuring-soc-dfir-resilience-with-threat-range</link>
                <description>SOC burnout is real. See how HTB’s Threat Range rebuilds resilience and delivers measurable value through realistic, data-driven blue team simulations.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/Q8XskdIZCbnHhXaGANW5dlVDHiwXotge.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Blue Teaming</category>
                <pubDate>Thu, 06 Nov 2025 08:30:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/measuring-soc-dfir-resilience-with-threat-range</guid>
            </item>
                    <item>
                <title>Board-ready cyber resilience: How to track and prove readiness</title>
                <link>https://www.hackthebox.com/blog/soc-dfir-resilience-metrics-reporting</link>
                <description>Show measurable cyber readiness to boards and regulators. TRI gives CISOs clear insights into SOC and DFIR performance under real-world attacks.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/0i8KPywyfnE7y22qWHnu8bwZ7dPTKnx4.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Blue Teaming</category>
                <pubDate>Wed, 29 Oct 2025 08:31:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/soc-dfir-resilience-metrics-reporting</guid>
            </item>
                    <item>
                <title>How 11,000+ investigators cracked the case in Holmes, HTB’s defensive CTF</title>
                <link>https://www.hackthebox.com/blog/blue-team-defensive-ctf-holmes-2025-recap</link>
                <description>HTB’s first all-blue Holmes CTF brought 11,000+ defenders together to tackle DFIR, SOC, malware, and threat hunting challenges in a fully immersive investigation.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/k5aPNprJSHC3VsDXVdSHNDV63e53FJLu.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Blue Teaming</category>
                <pubDate>Fri, 24 Oct 2025 10:52:00 +0000</pubDate>
                <guid>https://www.hackthebox.com/blog/blue-team-defensive-ctf-holmes-2025-recap</guid>
            </item>
            </channel>
</rss>
