What Can We Help You Find?

August 13, 2020
Netwrix Account Lockout Examiner (versions prior to 5.1) allows an unauthenticated remote adversary to capture the NTLMv1/v2 challenge response....
Blog

July 22, 2020
An attacker could use a poisoned docker image to break out of a container.
Blog

July 10, 2020
Optiv is releasing REST API Goat, a vulnerable API, to help boost AppSec skills.
Blog

July 02, 2020
Here is current analysis insight and a YARA rule to help you detect HiddenTear ransomware variants.
Blog

June 30, 2020
How to prioritize efforts based on alert information from Microsoft Defender ATP, Logic Apps, and Log Analytics.
Blog

June 19, 2020
Burp Suite’s Intruder tool can be used to automate testing for weak/default passwords.
Blog

June 19, 2020
Talon automates a password guessing technique targeting Kerberos and LDAP within the Windows Active Directory environment.
Blog

June 11, 2020
A how to guide using Gitlab, Hashicorp Terraform Cloud, AWS EKS and Palo Alto Networks Prisma Cloud to build and secure a Kubernetes cluster.
Blog

June 11, 2020
The Visual Lock Picking Workstation displays the inner workings of a lock while teaching lock picking.
Blog

June 11, 2020
This paper explores the Burp Suite extension for Azure API Management to automatically identify gateway misconfigurations and to display the tracing....
Blog

June 11, 2020
Part 3 of series: Prioritizing Microsoft Defender ATP endpoint alert telemetry with MITRE ATT&CK.
Blog

June 11, 2020
Optiv’s Source Zero is a new technical cybersecurity thought leadership resource.
Press Release