Security Abuse of Misconfigured Active Directory Certificate Services Continue
Notes from the Field   10 MIN READ

Security Abuse of Misconfigured Active Directory Certificate Services Continue

by Eleanor Barlow • Jan 2025
What is an Endpoint Detection & Response (EDR) Silencer?
Notes from the Field   6 MIN READ

What is an Endpoint Detection & Response (EDR) Silencer?

by Eleanor Barlow • Oct 2024
Resurgence in Lumma Stealer Malware Campaigns – Notes from the Field
Notes from the Field   10 MIN READ

Resurgence in Lumma Stealer Malware Campaigns – Notes from the Field

by Eleanor Barlow • Oct 2024
Notes from the Field. The Value of Log Management to Prevent Risks
Notes from the Field   5 Min READ

Notes from the Field. The Value of Log Management to Prevent Risks

by Eleanor Barlow • Jun 2024
Defend Against Social Engineering Campaigns Leveraging Typosquatting
Notes from the Field   10 MIN READ

Defend Against Social Engineering Campaigns Leveraging Typosquatting

by Eleanor Barlow • Feb 2024
Malicious ISATAP Tunneling Unearthed on Windows Server
Notes from the Field   10 MIN READ

Malicious ISATAP Tunneling Unearthed on Windows Server

by Eleanor Barlow • Jan 2024
Rising Cyber Threats in the Middle East – A Virtual Battleground
Notes from the Field   10 MIN READ

Rising Cyber Threats in the Middle East – A Virtual Battleground

by Patrick McAteer • Nov 2023
Mitigating Session Hijacking via NetScaler Citrix Bleed Vulnerability
Notes from the Field   10 MIN READ

Mitigating Session Hijacking via NetScaler Citrix Bleed Vulnerability

by Eleanor Barlow • Nov 2023