Every Solution You Can Imagine – and More What cybersecurity solution do you need? From Zero Trust to ADR, IAM, risk/privacy, data protection, AppSec and threat, securing digital transformation, to resiliency and remediation, we can build the right program to help solve your challenges.
A Single Partner for Everything You Need Optiv works with more than 400 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Image Selective YARA Scanning: What’s Your Type? March 30, 2022 This post explains how to use YARA rules differently by targeting only the files that apply to the rules being used to improve scan results. See Details Blog
Image Breaking the (WDAPT) Rules with COM May 12, 2021 This article explores gaps that allow for the undetected execution of code on systems protected by Microsoft Defender Advanced Threat Protection. See Details Blog
Image BadOutlook for C2 March 18, 2021 Given Office product functionality, it’s possible for adversaries to leverage Outlook's COM interface in attacks for extended persistence. See Details Blog
Image EDR and Blending In: How Attackers Avoid Getting Caught February 03, 2021 Even when the hooks are removed, defenders can still leverage other EDR functions, such as host isolation for incident triage or remote. See Details Blog
Image Endpoint Detection and Response: How Hackers Have Evolved February 02, 2021 This post identifies systemic endpoint detection and response issues and examines how attackers can bypass any EDR product. See Details Blog
Image COVID-19: From the Mindset of the Attacker April 24, 2020 We’ve seen lots of COVID-19-related work-from-home tips, but how has it affected the attacker? See Details Blog
Image Intelligence Bulletin – MinionGhost Reemerges March 21, 2018 At approximately 9:30am EDT on 20 March 2018, hacktivist collective, MinionGhost, announced planned cyber attacks against unspecified Asian entities.... See Details Blog
Image Intelligence Bulletin – When Cryptomining Attacks February 06, 2018 Optiv has seen a continuation of attacks based off the usage of CryptoNight miner, in this case likely mining Monero cryptocurrency for the attackers.... See Details Blog
Image PCI Compliance Every Day – Requirement 5 November 19, 2017 In this latest post of my PCI compliance blog series, we will explore Requirement 5, which has four distinct requirements that imply they need to be.... See Details Blog
Image Update: Intelligence Advisory – Petya Outbreak June 29, 2017 This is an update to the Intelligence Advisory: Petya Ransomware Outbreak - released June 27, 2017. Optiv’s Global Threat Intelligence Center (gTIC).... See Details Blog
Image Petya / Petna / NotPetya Ransomware Recommendations from the Trenches June 28, 2017 Here we go again. Not long ago I updated a blog post containing actionable recommendations to protect your environment from ransomware threats.... See Details Blog
Image Intelligence Advisory – New Petya Ransomware Outbreak June 26, 2017 Optiv’s Global Threat Intelligence Center (gTIC) received reports from several sources concerning a recent modification to the Petya ransomware strain.... See Details Blog