Image
SZ_Kubernetes-Information-Clusters_476x210_Red

June 17, 2021

Optiv highlights the attack strategy of using forged Kerberos tickets to compromise a domain, and provides ways to defend against it.

Blog

Image
Endpoint_Protection_and_EDR_bk5

March 18, 2021

Given Office product functionality, it’s possible for adversaries to leverage Outlook's COM interface in attacks for extended persistence.

Blog

Image
security_of_collaboration_tools_list_bk8_476x210

February 17, 2021

Captcha images don’t provide robust protection as a primary security control. This analysis explores how to prevent automated (bot) attacks.

Blog