OpenText Security Cloud Team profile image.
Authors

OpenText Security Cloud Team

Dissecting IcedID behavior on an infected endpoint

IcedID, also known as BokDot, is a banking trojan that was first discovered in 2017. It targets a victim’s financial information and it is also…

March 30, 2023 4 minute read
Technology meets tenacity

Technology meets tenacity

Technology alone won’t defeat cybercriminals. Effective cybersecurity isn’t something you buy off the shelf, set, and forget. To secure your data, you must be proactive,…

November 03, 2022 4 minute read

OpenText MxDR platform: a team player

OpenText MxDR platform: a team player

There’s a truism in the cybersecurity sector that says enterprise technology stacks are so large because the market demanded big-stack solutions. Convenience, fiscal constraints, and…

November 01, 2022 3 minute read

Stopping threats cold

Stopping threats cold

Imagine NFL football before Don “Red Dog” Ettinger changed the game by “blitzing” linebackers into the opposing team’s backfield, or hockey before Bobby Orr showed…

October 31, 2022 4 minute read

OpenText MxDR Platform: By the numbers

OpenText MxDR Platform: By the numbers

There’s one thing about data: it doesn’t lie. It’s either on or off, zero or one.  Data protection and threat remediation are like that, too….

October 28, 2022 4 minute read

Cut the noise. Cue the results.

Cut the noise. Cue the results.

If you faced a worker shortage, wouldn’t it make sense to optimize the time of the employees you do have?  According to the latest report…

October 27, 2022 3 minute read

The human dimension of cybercrime

The human dimension of cybercrime

It’s called cybercrime, but humans are at its core, and understanding how they operate is essential for combatting their actions.  While traditional cybersecurity tactics focused…

October 26, 2022 4 minute read

Targeted DFIR evidence collections

Targeted DFIR evidence collections

During or after an incident, there may be a need for forensic analysis on the endpoints involved in a breach or compromise. This blog discusses…

September 30, 2022 5 minute read

Network security: from reactive alerts to proactive threat hunting

Network security: from reactive alerts to proactive threat hunting

In any security-minded organization, there are three ways to prevent or mitigate threats beyond firewalls, passwords or locks. Imagine defending your network as you would…

September 27, 2022 4 minute read

NetSupport Remote Access Trojan (RAT) delivered through fake browser updates by SocGholish threat actors

NetSupport Remote Access Trojan (RAT) delivered through fake browser updates by SocGholish threat actors

The SocGholish campaign is suspected to be linked to the Russian threat actor known as “Evil Corp”. The threat actors are known to drop HTML…

August 24, 2022 4 minute read

What’s new in OpenText EnCase Endpoint Investigator

What’s new in OpenText EnCase Endpoint Investigator

August 2022: What’s new in EnCase Endpoint Investigator CE 22.3? As enterprises continue to face the challenges associated with cybersecurity threats that come from internal…

August 08, 2022 3 minute read

What’s new in OpenText EnCase Forensic

What’s new in OpenText EnCase Forensic

August 2022: What’s New with EnCase Forensic v22.3 With the release of EnCase Forensic v22.3, digital forensic investigators can now take advantage of AFF4 functionality. …

August 08, 2022 2 minute read

Modernizing data collection with OpenText EnCase Information Assurance

Modernizing data collection with OpenText EnCase Information Assurance

In today’s digital world, business communications are evolving, and organizations are adapting to new modern work environments. Historically, data was located primarily on in-house workstations…

June 21, 2022 4 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.