Justin Safa
Cybersecurity Consultant | Digital Forensics & Incident Response
LinkedIn
LinkedIn
Blogs & Videos
BEC & Phishing Investigations in Microsoft 365
BEC & Phishing Investigations in Microsoft 365
Don’t Upload Your .HAR Files In Plaintext
Don’t Upload Your .HAR Files In Plaintext
Optiv's Source Zero team takes you on an internet safari to hunt for HAR files and explore recommendations for defending against token theft attacks.
Understanding The Zone-Based Incident Recovery Model (ZBIRM)
Understanding The Zone-Based Incident Recovery Model (ZBIRM)
Learn why the Zone-Based Incident Recovery Model is the accepted best practice for organizations to quickly recover from large-scale cyber incidents.
QR Codes & Adversary-in-the-Middle (AiTM) Phishing
QR Codes & Adversary-in-the-Middle (AiTM) Phishing
How do adversaries leverage QR codes to bypass MFA controls in phishing attacks? Learn more from red and blue teamer perspectives.
Don't Get Locked Out Of Entra ID In An Emergency
Don't Get Locked Out Of Entra ID In An Emergency
Don’t get locked out of your M365 tenant in an emergency. Review our best practices for emergency access accounts in Entra ID.
Media Insights
Docusign account holders spread ‘strikingly authentic’ invoices
Docusign account holders spread ‘strikingly authentic’ invoices
HHS Warns Health Sector of Business Email Compromise Scams
HHS Warns Health Sector of Business Email Compromise Scams
Justin Safa | Optiv Source Zero
Justin Safa | Optiv Source Zero
View on mobile