Common Information
Type | Value |
---|---|
Value |
legal@optiv.com |
Category | |
Type | |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-01-30 | 4 | Securing API Dependencies | ||
Details | Website | 2024-01-26 | 4 | Managing Perspectives for Assessment Reports with Few or Zero Findings | ||
Details | Website | 2023-11-20 | 10 | Redirectors: A Red Teamer’s Introduction | ||
Details | Website | 2023-07-13 | 5 | Preparing for Your Netskope Implementation | ||
Details | Website | 2023-02-02 | 4 | Netskope Endpoint DLP Is Here! | ||
Details | Website | 2021-11-19 | 2 | Automated Endpoint Evaluations – Part 3 Creating Virtual Machines and Allowed IP Address Assignment as part of a Power Automate Cloud Flow | ||
Details | Website | 2021-10-06 | 2 | Automated Endpoint Evaluations – Part 2 | ||
Details | Website | 2021-08-17 | 13 | Microsoft 365 OAuth Device Code Flow and Phishing | ||
Details | Website | 2021-08-12 | 2 | Automated Endpoint Evaluations – Part 1 | ||
Details | Website | 2021-08-10 | 2 | PetitPotam & Active Directory Certificate Services | ||
Details | Website | 2021-06-17 | 26 | Kubernetes Attack Surface | ||
Details | Website | 2021-06-17 | 25 | Go365: Office 365 Password Spraying Tool | ||
Details | Website | 2021-06-02 | 23 | Kerberos - A Domains Achille's Heel | ||
Details | Website | 2021-05-12 | 28 | Breaking the (WDAPT) Rules with COM | ||
Details | Website | 2021-04-23 | 2 | Credential Theft Prevention With a Palo Alto Networks NGFW | ||
Details | Website | 2021-04-12 | 12 | Accelerating Vulnerability Remediation with Automation | ||
Details | Website | 2021-03-24 | 3 | Firefox Addons For Application Security Testing | ||
Details | Website | 2021-03-22 | 25 | MobileIron MDM Contains Static Key Allowing Account Enumeration | ||
Details | Website | 2021-03-18 | 2 | BadOutlook for C2 | ||
Details | Website | 2021-02-17 | 35 | Automating Captcha Attacks | ||
Details | Website | 2021-02-03 | 4 | EDR and Blending In: How Attackers Avoid Getting Caught | ||
Details | Website | 2021-02-02 | 6 | Endpoint Detection and Response: How Hackers Have Evolved | ||
Details | Website | 2021-02-01 | 2 | The Evolution of Cloud Forensics and Incident Response | ||
Details | Website | 2020-12-11 | 20 | Abusing AirWatch MDM Services to Bypass MFA | ||
Details | Website | 2020-11-05 | 23 | Certificate Validation Disabled in Black Duck API Wrapper |