Anonymous Sudan Amidst a Wave of Attacks Against the UAE. What You Need to Know.
Notes from the Field   10 MIN READ

Anonymous Sudan Amidst a Wave of Attacks Against the UAE. What You Need to Know.

by Eleanor Barlow • May 2023
7 Types of Social Engineering Attacks Targeting You
Notes from the Field   10 MIN READ

7 Types of Social Engineering Attacks Targeting You

by Vanashree Chowdhury • Feb 2023
Top 12 Tips to Enforce Firewall & Proxy Internal Controls
Notes from the Field   10 MIN READ

Top 12 Tips to Enforce Firewall & Proxy Internal Controls

by Deodatta Wandhekar • Jan 2023
Enhancing Firewall & Proxy Perimeter Controls
Notes from the Field   10 MIN READ

Enhancing Firewall & Proxy Perimeter Controls

by Deodatta Wandhekar • Jan 2023
How the MITRE ATT&CK Framework Has Revolutionised Cyber Security
Notes from the Field   10 MIN READ

How the MITRE ATT&CK Framework Has Revolutionised Cyber Security

by Zee Sayi • May 2022
Security 101. Don’t Bash Your Head Over Unsecured Credentials
Notes from the Field   4 MIN READ

Security 101. Don’t Bash Your Head Over Unsecured Credentials

by Aaron Hambleton • Jan 2022
Using Favicon Hashes to Spot Vulnerabilities
Notes from the Field   6 MIN READ

Using Favicon Hashes to Spot Vulnerabilities

by Prasad Dhole • Dec 2021
Email Vulnerability Pandemic. Are All Emails Worth Opening?
Notes from the Field   3 MIN READ

Email Vulnerability Pandemic. Are All Emails Worth Opening?

by Swapnil Bhosale • Oct 2021
Security 101: Compromised AWS S3 Buckets
Notes from the Field   6 MIN READ

Security 101: Compromised AWS S3 Buckets

by Nikhil Mohanlal • Sep 2021