Image
Source Zero Con List Image

Join us for Source Zero Con Virtual, May 25. At Source Zero Con, Optiv’s technical experts will present practical demonstrations of new security...

Event

Image
Endpoint_Protection_and_EDR_bk5

March 18, 2021

Given Office product functionality, it’s possible for adversaries to leverage Outlook's COM interface in attacks for extended persistence.

Blog

Image
security_of_collaboration_tools_list_bk8_476x210

February 17, 2021

Captcha images don’t provide robust protection as a primary security control. This analysis explores how to prevent automated (bot) attacks.

Blog