Skip to main content
Sort By:

New PCI Data Security Standard Guidelines | Optiv

Recently, the Risk Assessment Special Interest Group (SIG) and Payment Card Industry (PCI) Security Standards Council published the PCI Data Security ...

See Details

Preparing for the Next Spear Phishing Attack

If you need proof that any organization can be hacked, even the most secure ones, just do an Internet search for “spear phishing attacks.” You might b...

See Details

Password Disclosure in D-Link Surveillance Cameras (CVE-2012-4046)

Many people are using the popular D-Link network cameras available at Best Buy, Office Depot, Staples and, expecting a private video feed t...

See Details

Mobile Security UK Webinar | Optiv

Enterprise users are using multiple devices to tap into the corporate network. Connectivity, portability and productivity are the “three legs” of mobi...

See Details

Disaster Recovery Testing - The Sandy Effect

Most organizations that we do business with have disaster recovery policies and/or business continuity policies, but in the weeks leading up to and fo...

See Details

PLUG and PWN: No-tech to Low-tech Hacking, Part Two

Continuing with the first part of this post, we’ll take a look at another device to drop onto a client’s network during a successful social engineerin...

See Details

Owning Computers Without Shell Access

Consultants often upload and execute a binary payload to a remote system during penetration tests for the purpose of footprinting the target, gatherin...

See Details

IP Theft Prevention: Beyond Just Technology

News headlines about credit card numbers being stolen and other successful security attacks on intellectual property (IP) during the last decade have ...

See Details

Analyzing CVE 2012-0158

On a recent engagement, we encountered a number of malicious documents. Among these, we discovered a mostly undocumented strain of CVE-2012-0158 explo...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.