OpenText Security Cloud Team profile image.
Authors

OpenText Security Cloud Team

Dissecting IcedID behavior on an infected endpoint

IcedID, also known as BokDot, is a banking trojan that was first discovered in 2017. It targets a victim’s financial information and it is also…

March 30, 2023 4 minutes read
Dissecting IcedID behavior on an infected endpoint

Dissecting IcedID behavior on an infected endpoint

IcedID, also known as BokDot, is a banking trojan that was first discovered in 2017. It targets a victim’s financial information and it is also…

March 30, 2023 4 minutes read
Technology meets tenacity

Technology meets tenacity

Technology alone won’t defeat cybercriminals. Effective cybersecurity isn’t something you buy off the shelf, set, and forget. To secure your data, you must be proactive,…

November 3, 2022 4 minutes read
OpenText MxDR platform: a team player

OpenText MxDR platform: a team player

There’s a truism in the cybersecurity sector that says enterprise technology stacks are so large because the market demanded big-stack solutions. Convenience, fiscal constraints, and…

November 1, 2022 3 minutes read
Stopping threats cold

Stopping threats cold

Imagine NFL football before Don “Red Dog” Ettinger changed the game by “blitzing” linebackers into the opposing team’s backfield, or hockey before Bobby Orr showed…

October 31, 2022 4 minutes read
OpenText MxDR Platform: By the numbers

OpenText MxDR Platform: By the numbers

There’s one thing about data: it doesn’t lie. It’s either on or off, zero or one.  Data protection and threat remediation are like that, too….

October 28, 2022 4 minutes read
Cut the noise. Cue the results.

Cut the noise. Cue the results.

If you faced a worker shortage, wouldn’t it make sense to optimize the time of the employees you do have?  According to the latest report…

October 27, 2022 3 minutes read
The human dimension of cybercrime

The human dimension of cybercrime

It’s called cybercrime, but humans are at its core, and understanding how they operate is essential for combatting their actions.  While traditional cybersecurity tactics focused…

October 26, 2022 4 minutes read
Targeted DFIR evidence collections

Targeted DFIR evidence collections

During or after an incident, there may be a need for forensic analysis on the endpoints involved in a breach or compromise. This blog discusses…

September 30, 2022 5 minutes read
Network security: from reactive alerts to proactive threat hunting

Network security: from reactive alerts to proactive threat hunting

In any security-minded organization, there are three ways to prevent or mitigate threats beyond firewalls, passwords or locks. Imagine defending your network as you would…

September 27, 2022 4 minutes read
NetSupport Remote Access Trojan (RAT) delivered through fake browser updates by SocGholish threat actors

NetSupport Remote Access Trojan (RAT) delivered through fake browser updates by SocGholish threat actors

The SocGholish campaign is suspected to be linked to the Russian threat actor known as “Evil Corp”. The threat actors are known to drop HTML…

August 24, 2022 4 minutes read
What’s new in OpenText EnCase Endpoint Investigator

What’s new in OpenText EnCase Endpoint Investigator

August 2022: What’s new in EnCase Endpoint Investigator CE 22.3? As enterprises continue to face the challenges associated with cybersecurity threats that come from internal…

August 8, 2022 3 minutes read
What’s new in OpenText EnCase Forensic

What’s new in OpenText EnCase Forensic

August 2022: What’s New with EnCase Forensic v22.3 With the release of EnCase Forensic v22.3, digital forensic investigators can now take advantage of AFF4 functionality. …

August 8, 2022 2 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.