Skip to main content
Contact
Search
HOW CAN WE HELP?

Let us know what you need, and we will have an Optiv professional contact you shortly.

General Inquiries
800-574-0896
info@optiv.com

Incident Response
(888) 732-9407

Invoicing Requests
invoicing@optiv.com

Copy the Below Link To Your RSS Reader

Main navigation

  • Security Solutions
    • Cyber Digital Transformation
      • Analytics and Big Data
      • Cloud Security Solutions
      • Cybersecurity Orchestration and Automation
      • Product Security Services
    • Cybersecurity Maturity Model Certification (CMMC)
    • Identity and Data Management
      • Digital Access Management
      • Identity Governance and Administration
      • Data Governance and Protection
    • Optiv Federal
    • Risk Management and Transformation
      • Cyber Resilience
      • Privacy and Governance
      • Risk Optimization
    • Security Operations
      • Advanced Fusion Center Operations
      • Cyber Authorized Support Services
      • Cyber-as-a-Service
      • Intelligence Operations
      • Managed Detection and Response Services
      • Managed Security Services
    • Security Services
      • Application Security
      • Architecture and Implementation
      • Attack and Penetration
      • Canadian Operations
      • Cybersecurity Education
      • GDPR
      • PCI Compliance Management and Consulting Services
      • Software Assurance-as-a-Service
      • Security Program Strategy
      • ThreatDNA and ThreatBEAT
    • Security Technology
      • Application Security Technology
      • Cloud Security Technology
      • Data Security Technology
      • Endpoint Security Technology
      • Identity and Access Management Technology
      • Network Security Technology
      • Security Operations Solutions Technology
    • Threat Management
      • Attack and Penetration
  • Partner Directory
  • Explore Optiv Insights
    • Blog
    • CISO Periodic Table
    • Cybersecurity Dictionary
    • Downloads
    • Press Releases
    • Source Zero
    • Videos
  • Our Story
    • Client Success Stories
    • Events
    • Leadership
    • Locations
    • News and Awards
    • Optiv Chips In
  • Join the Team
    • Careers
    • Resources
  • Client Portal
By:
gTIC
Image
intelligence_bulletin_india_list_476x210

Intelligence Bulletin – India Hiring Proxy

September 18, 2018

On June 4, 2018, Optiv gTIC Human Intelligence (HUMINT) cell contacted an India-based individual providing interview-proxy services for job applicants....

See Details

Blog

Image
intel_bulletin_list_476x210

Intelligence Bulletin – MinionGhost Reemerges

March 21, 2018

At approximately 9:30am EDT on 20 March 2018, hacktivist collective, MinionGhost, announced planned cyber attacks against unspecified Asian entities....

See Details

Blog

Image
gen_blog_list_item

Intelligence Bulletin – When Cryptomining Attacks

February 06, 2018

Optiv has seen a continuation of attacks based off the usage of CryptoNight miner, in this case likely mining Monero cryptocurrency for the attackers....

See Details

Blog

Image
gen_blog_list_item

Update: Intelligence Advisory – Petya Outbreak

June 29, 2017

This is an update to the Intelligence Advisory: Petya Ransomware Outbreak - released June 27, 2017. Optiv’s Global Threat Intelligence Center (gTIC)....

See Details

Blog

Image
gen_blog_list_item

Intelligence Advisory – New Petya Ransomware Outbreak

June 26, 2017

Optiv’s Global Threat Intelligence Center (gTIC) received reports from several sources concerning a recent modification to the Petya ransomware strain....

See Details

Blog

Image
gen_blog_list_item

The 3 Pillars of Intelligence: Shaping Policy

January 12, 2015

In today’s world of evolving threats and a geo-political landscape that opens up attacks on private organizations by nation-state sponsored entities....

See Details

Blog

Image
gen_blog_list_item

Threat Intelligence - Evaluating Sources | Optiv

May 15, 2014

One of the highest concerns faced by the intelligence analyst lies in knowing if the assessment they are making hits the mark. As the analyst....

See Details

Blog

Image
gen_blog_list_item

Two Methods for Visualizing Intelligence

March 17, 2014

You should be familiar with the phrase “a picture is worth a thousand words.” In the gTIC, we agree 100% and are sure that most Information Technology....

See Details

Blog

Image
gen_blog_list_item

Demystifying Hardware Security – Part III

March 12, 2014

Welcome to Part III of this series on hardware security. In Part II we explored passive data captures of EEPROM read operations over the SPI bus. In....

See Details

Blog

Image
gen_blog_list_item

Developing Requirements for Your Intelligence Section

February 12, 2014

The main way an intelligence analyst begins to create a product is to have a requirement identified to collect against. In a previous blog,....

See Details

Blog

Image
gen_blog_list_item

Applying the Military's F3EAD Framework to Cyber Threat Intelligence

August 15, 2013

In today's cyberthreat landscape, intelligence can alert you to new and emerging global threats that may affect your network operations. Intelligence....

See Details

Blog

Image
gen_blog_list_item

Intelligence Preparation of the Battlefield: What is Your Footprint?

April 28, 2013

Intelligence is defined as the gathering of information or raw data that has been analyzed for its validity and usefulness. One of the first exercises....

See Details

Blog

Footer menu

  • Security Solutions
  • Partner Directory
  • Explore Optiv Insights
  • Our Story
  • Join Optiv Team
  • Client Portal

 

 

Home | Contact | Cookie Policy | Privacy Policy | Terms of Use | Sitemap

 

The content provided is for informational purposes only. Links to third party sites are provided for your convenience and do not constitute an endorsement. These sites may not have the same privacy, security or accessibility standards.

 

© 2020 – 2021. Optiv Security Inc. All Rights Reserved.