All Posts - Category: Notes from the Field
![Notes from the Field. The Value of Log Management to Prevent Risks](https://www.securityhq.com/wp-content/uploads/2020/08/The-Value-of-Log-Management-thumbnail.jpg)
Notes from the Field
5 Min READ
Notes from the Field. The Value of Log Management to Prevent Risks
by Eleanor Barlow • Jun 2024
![Defend Against Social Engineering Campaigns Leveraging Typosquatting](https://www.securityhq.com/wp-content/uploads/2024/02/528-×-347px-Defend-Against-Social-Engineering-Campaigns-Leveraging-Typosquatting.png)
Notes from the Field
10 MIN READ
Defend Against Social Engineering Campaigns Leveraging Typosquatting
by Patrick Oliveira Fry • Feb 2024
![Malicious ISATAP Tunneling Unearthed on Windows Server](https://www.securityhq.com/wp-content/uploads/2024/01/528x347-Malicious-ISATAP-Tunneling-Unearthed-on-Windows-Server.png)
Notes from the Field
10 MIN READ
Malicious ISATAP Tunneling Unearthed on Windows Server
by Ninad Chogale • Jan 2024
![Rising Cyber Threats in the Middle East – A Virtual Battleground](https://www.securityhq.com/wp-content/uploads/2023/11/528x347-Rising-Cyber-Threats-in-the-Middle-East-A-Virtual-Battleground.png)
Notes from the Field
10 MIN READ
Rising Cyber Threats in the Middle East – A Virtual Battleground
by Patrick McAteer • Nov 2023
![Mitigating Session Hijacking via NetScaler Citrix Bleed Vulnerability](https://www.securityhq.com/wp-content/uploads/2023/11/Mitigating-Session-Hijacking-via-NetScaler-Citrix-Bleed-Vulnerability-528x347-1.png)
Notes from the Field
10 MIN READ
Mitigating Session Hijacking via NetScaler Citrix Bleed Vulnerability
by Ninad Chogale • Nov 2023
![QR Code Vulnerabilities: Dissecting New Techniques Seen in the Wild](https://www.securityhq.com/wp-content/uploads/2023/10/528-x-347-QR-Code-Vulnerabilities-Dissecting-New-Techniques-Seen-in-the-Wild.png)
Notes from the Field
10 MIN READ
QR Code Vulnerabilities: Dissecting New Techniques Seen in the Wild
by Darshan Thakkar • Oct 2023
![Red and Blue Cyber Teams – A Tactical Arena!](https://www.securityhq.com/wp-content/uploads/2023/10/Red-and-Blue-Cyber-Teams-A-Tactical-Arena-528x347px.png)
Notes from the Field
6 MIN READ
Red and Blue Cyber Teams – A Tactical Arena!
by Reza Razmi • Oct 2023
![Binary Ballet: China’s Espionage Tango with Microsoft](https://www.securityhq.com/wp-content/uploads/2023/08/Binary-Ballet-Chinas-Espionage-Tango-with-Microsoft-528x347-1.png)
Notes from the Field
6 MIN READ
Binary Ballet: China’s Espionage Tango with Microsoft
by Eleanor Barlow • Aug 2023