OpenText Security Cloud Team profile image.
Authors

OpenText Security Cloud Team

Dissecting IcedID behavior on an infected endpoint

IcedID, also known as BokDot, is a banking trojan that was first discovered in 2017. It targets a victim’s financial information and it is also…

March 30, 2023 4 minutes read
Modernizing data collection with OpenText EnCase Information Assurance

Modernizing data collection with OpenText EnCase Information Assurance

In today’s digital world, business communications are evolving, and organizations are adapting to new modern work environments. Historically, data was located primarily on in-house workstations…

June 21, 2022 4 minutes read
Building a cyber resilient and safer world

Building a cyber resilient and safer world

Join us for the Security Cloud Track at OpenText World EMEA 2022 As organizations continue to transform and recover from the pandemic, security teams must…

May 30, 2022 3 minutes read
Dissecting Netwire Remote Access Trojan (RAT) behavior on an infected endpoint

Dissecting Netwire Remote Access Trojan (RAT) behavior on an infected endpoint

Netwire is a Remote Access Trojan (RAT) capable of stealing passwords, keylogging, and includes remote control capabilities. Netwire RAT has been used by advanced persistent…

April 29, 2022 2 minutes read
Maintaining heightened cyber safety during uncertain times

Maintaining heightened cyber safety during uncertain times

Situation overview Russia’s invasion of Ukraine is a prime example of one nation employing a combination of traditional weaponry and cyberattacks against another to disrupt…

March 9, 2022 4 minutes read
Introducing Bricata Network Detection & Response

Introducing Bricata Network Detection & Response

Helping businesses and organizations keep operations in a trusted state  In today’s digital world, enterprises and organizations of all sizes have one thing in common…

February 22, 2022 4 minutes read
Launch extended detection and response steps to manage Log4j vulnerability

Launch extended detection and response steps to manage Log4j vulnerability

Threat Hunts must include cloud, network, endpoint, log and email vectors Note: OpenText™ Security reports that there is no Log4j impact on its EnCase suite…

December 14, 2021 3 minutes read
Catching threats in minutes, not days with OpenText MDR – Part 2

Catching threats in minutes, not days with OpenText MDR – Part 2

We continue the conversation with Fabian Franco, Senior Manager of Digital Forensic Incident Response (DFIR), Threat Hunting and Security Operations, OpenText, and Kevin Golas, Director…

December 10, 2021 5 minutes read
Introducing OpenText EnCase Incident Response

Introducing OpenText EnCase Incident Response

Corporations are facing constant cybersecurity threats. They need to be able to respond by quickly and proactively conducting investigations that can identify a potential threat….

November 23, 2021 2 minutes read
Introducing OpenText Digital Evidence Center

Introducing OpenText Digital Evidence Center

Imagine this. You’re a large police force for a major metropolitan city. You investigate thousands of cases a year.  In these investigations, officers and investigators collect mountains…

November 22, 2021 4 minutes read
Announcing OpenText Security & Protection Cloud CE 21.4

Announcing OpenText Security & Protection Cloud CE 21.4

With OpenText™ Cloud Editions (CE) 21.4, OpenText is pleased to bring to market additional capabilities and offerings aimed at making the world a safer, more secure place…

November 16, 2021 3 minutes read
Catching threats in minutes, not days with OpenText MDR – Part 1

Catching threats in minutes, not days with OpenText MDR – Part 1

Every 11 seconds there is a ransomware attack. Bad actors are targeting companies and critical infrastructure systems for their next opportunity. In many cases, they…

September 28, 2021 6 minutes read
Top 5 benefits of endpoint security software

Top 5 benefits of endpoint security software

Virtually every organization today is facing a rapid increase in the number of endpoints connecting to their network. In addition to user devices – such…

September 21, 2021 9 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.