QR Code Vulnerabilities: Dissecting New Techniques Seen in the Wild
Notes from the Field   10 MIN READ

QR Code Vulnerabilities: Dissecting New Techniques Seen in the Wild

by Darshan Thakkar • Oct 2023
Red and Blue Cyber Teams – A Tactical Arena!
Notes from the Field   6 MIN READ

Red and Blue Cyber Teams – A Tactical Arena!

by Reza Razmi • Oct 2023
Binary Ballet: China’s Espionage Tango with Microsoft
Notes from the Field   6 MIN READ

Binary Ballet: China’s Espionage Tango with Microsoft

by Eleanor Barlow • Aug 2023
New Wave of Spear Phishing Emails within HTML Attachment- An Analysts View
Notes from the Field   10 MIN READ

New Wave of Spear Phishing Emails within HTML Attachment- An Analysts View

by Ninad Chogale • Jul 2023
Navigating Cyber Risks in Australia: Key Insights and Proactive Measures
Notes from the Field   10 MIN READ

Navigating Cyber Risks in Australia: Key Insights and Proactive Measures

by Eleanor Barlow • Jun 2023
Anonymous Sudan Amidst a Wave of Attacks Against the UAE. What You Need to Know.
Notes from the Field   10 MIN READ

Anonymous Sudan Amidst a Wave of Attacks Against the UAE. What You Need to Know.

by Eleanor Barlow • May 2023
7 Types of Social Engineering Attacks Targeting You
Notes from the Field   10 MIN READ

7 Types of Social Engineering Attacks Targeting You

by Vanashree Chowdhury • Feb 2023
Top 12 Tips to Enforce Firewall & Proxy Internal Controls
Notes from the Field   10 MIN READ

Top 12 Tips to Enforce Firewall & Proxy Internal Controls

by Deodatta Wandhekar • Jan 2023
Enhancing Firewall & Proxy Perimeter Controls
Notes from the Field   10 MIN READ

Enhancing Firewall & Proxy Perimeter Controls

by Deodatta Wandhekar • Jan 2023