Threat Alerts
Replaying an attack with OpenText NDR
In Network Detection and Response (NDR) related operations, there is often a need to replay a Packet Capture (PCAP) data stream. The reasons can be…
Understanding MITRE ATT&CK and Tidal Cyber Vendor Registry
In the ever-evolving cybersecurity landscape, staying ahead of the growing number of threats is a continuous challenge. Two critical resources in this fight are the…
• 5 minute read
Are you ready for a cyberattack?
In today’s digital age, cybersecurity threats are an ever-present danger for organizations of all sizes. While sophisticated technology solutions are critical in defending against cyber…
• 4 minute read
Cybersecurity Services combat an APT with NDR
Attackers linked to Iran and China are actively targeting critical infrastructure. Both the U.S. Environmental Protection Agency and National Security Agency have requested that each…
• 4 minute read
Strengthening Higher Education Institutions against evolving cyberthreats
As cyberthreats continue to evolve, it is crucial for higher education institutions and universities to be vigilant. Enforcing security strategies prudently designed to safeguard digital…
• 4 minute read
Strengthening cyber resilience
Cyberattacks are on track to cause $10.5 trillion a year in damage by 2025. That’s a 300 percent increase from 2015 levels. A robust cybersecurity…
• 4 minute read
OpenText Managed Security Services soar in Top 250
By 2025, according to Gartner Market Guide for Managed Detection and Response Services (February 2023), we foresee a significant shift: 60% of organizations will actively…
• 3 minute read
Dissecting IcedID behavior on an infected endpoint
IcedID, also known as BokDot, is a banking trojan that was first discovered in 2017. It targets a victim’s financial information and it is also…
• 4 minute read
OpenText is a leader in Detection and Response
MITRE Engenuity released today the results of its first ATT&CK Evaluations for Managed Services. OpenText™ joins the top tier with an outstanding performance for its…
• 3 minute read
Targeted DFIR evidence collections
During or after an incident, there may be a need for forensic analysis on the endpoints involved in a breach or compromise. This blog discusses…
• 5 minute read
NetSupport Remote Access Trojan (RAT) delivered through fake browser updates by SocGholish threat actors
The SocGholish campaign is suspected to be linked to the Russian threat actor known as “Evil Corp”. The threat actors are known to drop HTML…
• 4 minute read
Dissecting Netwire Remote Access Trojan (RAT) behavior on an infected endpoint
Netwire is a Remote Access Trojan (RAT) capable of stealing passwords, keylogging, and includes remote control capabilities. Netwire RAT has been used by advanced persistent…
• 2 minute read
Enabling Security Partners on MxDR Services
OpenText offers exciting opportunities for resellers, technology providers and service organizations to capture their share of the multi-billion US$ Information Management (IM) and Cybersecurity markets…
• 2 minute read
Stay in the loop!
Get our most popular content delivered monthly to your inbox.
Sign up