OpenText Security Cloud Team
Dissecting IcedID behavior on an infected endpoint
IcedID, also known as BokDot, is a banking trojan that was first discovered in 2017. It targets a victim’s financial information and it is also…
Technology meets tenacity
Technology alone won’t defeat cybercriminals. Effective cybersecurity isn’t something you buy off the shelf, set, and forget. To secure your data, you must be proactive,…
• 4 minute read
OpenText MxDR platform: a team player
There’s a truism in the cybersecurity sector that says enterprise technology stacks are so large because the market demanded big-stack solutions. Convenience, fiscal constraints, and…
• 3 minute read
Stopping threats cold
Imagine NFL football before Don “Red Dog” Ettinger changed the game by “blitzing” linebackers into the opposing team’s backfield, or hockey before Bobby Orr showed…
• 4 minute read
OpenText MxDR Platform: By the numbers
There’s one thing about data: it doesn’t lie. It’s either on or off, zero or one. Data protection and threat remediation are like that, too….
• 4 minute read
Cut the noise. Cue the results.
If you faced a worker shortage, wouldn’t it make sense to optimize the time of the employees you do have? According to the latest report…
• 3 minute read
The human dimension of cybercrime
It’s called cybercrime, but humans are at its core, and understanding how they operate is essential for combatting their actions. While traditional cybersecurity tactics focused…
• 4 minute read
Targeted DFIR evidence collections
During or after an incident, there may be a need for forensic analysis on the endpoints involved in a breach or compromise. This blog discusses…
• 5 minute read
Network security: from reactive alerts to proactive threat hunting
In any security-minded organization, there are three ways to prevent or mitigate threats beyond firewalls, passwords or locks. Imagine defending your network as you would…
• 4 minute read
NetSupport Remote Access Trojan (RAT) delivered through fake browser updates by SocGholish threat actors
The SocGholish campaign is suspected to be linked to the Russian threat actor known as “Evil Corp”. The threat actors are known to drop HTML…
• 4 minute read
What’s new in OpenText EnCase Endpoint Investigator
August 2022: What’s new in EnCase Endpoint Investigator CE 22.3? As enterprises continue to face the challenges associated with cybersecurity threats that come from internal…
• 3 minute read
What’s new in OpenText EnCase Forensic
August 2022: What’s New with EnCase Forensic v22.3 With the release of EnCase Forensic v22.3, digital forensic investigators can now take advantage of AFF4 functionality. …
• 2 minute read
Modernizing data collection with OpenText EnCase Information Assurance
In today’s digital world, business communications are evolving, and organizations are adapting to new modern work environments. Historically, data was located primarily on in-house workstations…
• 4 minute read
Stay in the loop!
Get our most popular content delivered monthly to your inbox.