Threat Alerts

Cybersecurity Services combat an APT with NDR

Attackers linked to Iran and China are actively targeting critical infrastructure.  Both the U.S. Environmental Protection Agency and National Security Agency have requested that each…

March 28, 2024 4 minute read
Strengthening Higher Education Institutions against evolving cyberthreats

Strengthening Higher Education Institutions against evolving cyberthreats

As cyberthreats continue to evolve, it is crucial for higher education institutions and universities to be vigilant.  Enforcing security strategies prudently designed to safeguard digital…

4 minute read

Strengthening cyber resilience

Strengthening cyber resilience

Cyberattacks are on track to cause $10.5 trillion a year in damage by 2025. That’s a 300 percent increase from 2015 levels. A robust cybersecurity…

4 minute read

OpenText Managed Security Services soar in Top 250

OpenText Managed Security Services soar in Top 250

By 2025, according to Gartner Market Guide for Managed Detection and Response Services (February 2023), we foresee a significant shift: 60% of organizations will actively…

3 minute read

Dissecting IcedID behavior on an infected endpoint

Dissecting IcedID behavior on an infected endpoint

IcedID, also known as BokDot, is a banking trojan that was first discovered in 2017. It targets a victim’s financial information and it is also…

4 minute read

OpenText is a leader in Detection and Response

OpenText is a leader in Detection and Response

MITRE Engenuity released today the results of its first ATT&CK Evaluations for Managed Services. OpenText™ joins the top tier with an outstanding performance for its…

3 minute read

Targeted DFIR evidence collections

Targeted DFIR evidence collections

During or after an incident, there may be a need for forensic analysis on the endpoints involved in a breach or compromise. This blog discusses…

5 minute read

NetSupport Remote Access Trojan (RAT) delivered through fake browser updates by SocGholish threat actors

NetSupport Remote Access Trojan (RAT) delivered through fake browser updates by SocGholish threat actors

The SocGholish campaign is suspected to be linked to the Russian threat actor known as “Evil Corp”. The threat actors are known to drop HTML…

4 minute read

Dissecting Netwire Remote Access Trojan (RAT) behavior on an infected endpoint

Dissecting Netwire Remote Access Trojan (RAT) behavior on an infected endpoint

Netwire is a Remote Access Trojan (RAT) capable of stealing passwords, keylogging, and includes remote control capabilities. Netwire RAT has been used by advanced persistent…

2 minute read

Enabling Security Partners on MxDR Services

Enabling Security Partners on MxDR Services

OpenText offers exciting opportunities for resellers, technology providers and service organizations to capture their share of the multi-billion US$ Information Management (IM) and Cybersecurity markets…

2 minute read

Maintaining heightened cyber safety during uncertain times

Maintaining heightened cyber safety during uncertain times

Situation overview Russia’s invasion of Ukraine is a prime example of one nation employing a combination of traditional weaponry and cyberattacks against another to disrupt…

4 minute read

Log4j vulnerability explained and how to respond

Log4j vulnerability explained and how to respond

On December 10th, warnings of the zero-day vulnerability found in the Java logging library, Apache Log4j 2.x, began to emerge. Today, we know that it…

4 minute read

Launch extended detection and response steps to manage Log4j vulnerability

Launch extended detection and response steps to manage Log4j vulnerability

Threat Hunts must include cloud, network, endpoint, log and email vectors Note: OpenText™ Security reports that there is no Log4j impact on its EnCase suite…

3 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.