
February 03, 2021
Even when the hooks are removed, defenders can still leverage other EDR functions, such as host isolation for incident triage or remote.
Blog
February 03, 2021
Even when the hooks are removed, defenders can still leverage other EDR functions, such as host isolation for incident triage or remote.
Blog
February 02, 2021
This post identifies systemic endpoint detection and response issues and examines how attackers can bypass any EDR product.
Blog
April 24, 2020
We’ve seen lots of COVID-19-related work-from-home tips, but how has it affected the attacker?
Blog
March 21, 2018
At approximately 9:30am EDT on 20 March 2018, hacktivist collective, MinionGhost, announced planned cyber attacks against unspecified Asian entities....
Blog
February 06, 2018
Optiv has seen a continuation of attacks based off the usage of CryptoNight miner, in this case likely mining Monero cryptocurrency for the attackers....
Blog
November 19, 2017
In this latest post of my PCI compliance blog series, we will explore Requirement 5, which has four distinct requirements that imply they need to be....
Blog
June 29, 2017
This is an update to the Intelligence Advisory: Petya Ransomware Outbreak - released June 27, 2017. Optiv’s Global Threat Intelligence Center (gTIC)....
Blog
June 27, 2017
Here we go again. Not long ago I updated a blog post containing actionable recommendations to protect your environment from ransomware threats....
Blog
June 26, 2017
Optiv’s Global Threat Intelligence Center (gTIC) received reports from several sources concerning a recent modification to the Petya ransomware strain....
Blog
June 14, 2017
Learn how to keep pace with ransomware dealers and survive the ever-evolving ransomware threat.
Download
June 13, 2017
Gain detailed insight into your infrastructure.
Download
May 31, 2017
Optiv delivers Cylance ThreatZERO services to help you overcome challenges in software integration.
Download