Security

Understanding MITRE ATT&CK and Tidal Cyber Vendor Registry

In the ever-evolving cybersecurity landscape, staying ahead of the growing number of threats is a continuous challenge. Two critical resources in this fight are the…

June 13, 2024 5 minute read
RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan

RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan

The RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser and third-party applications such as…

6 minute read

5 leadership lessons from the pandemic

5 leadership lessons from the pandemic

Every area of business has faced its own challenges over the past 15 months—from sales and marketing, to customer support and product development. On top of all that, cyber threats have grown as criminals rushed to take advantage of…

4 minute read

Addressing cyber resilience gaps across key infrastructure assets

Addressing cyber resilience gaps across key infrastructure assets

The ransomware attack on Colonial Pipeline was yet another wake up call for critical infrastructure and supply chains to rethink their approach for securing operations. In the past…

5 minute read

4 reasons why technology is vital—during and after ‘unprecedented’ times

4 reasons why technology is vital—during and after ‘unprecedented’ times

Organizations rely on information to anticipate trends, take advantage of new opportunities, and succeed in today’s world. As organizations around the world adapted to the…

4 minute read

Banks are fighting a multi-front war on fraud

Banks are fighting a multi-front war on fraud

According to S&P Global, the COVID-19 pandemic caused a “perfect storm” for financial services companies, which witnessed a 238 percent increase in cyber attacks in…

4 minute read

Why information assurance and security is important in 2021

Why information assurance and security is important in 2021

In March 2021, Chinese hackers broke into Microsoft Exchange Server and stole emails from over 250,000 customers worldwide. This raises two questions: How do you…

8 minute read

Announcing OpenText Security and Protection Cloud CE 21.2

Announcing OpenText Security and Protection Cloud CE 21.2

Forensic investigators and examiners are overwhelmed with the amount of evidence they must collect and examine, case logs are growing, and their investigative capacity is…

3 minute read

Security in the healthcare spotlight

Security in the healthcare spotlight

One of the most significant priorities facing healthcare in 2021 is the need for improved security. The rapid move to remote platforms and telehealth has…

4 minute read

Lessons from the SolarWinds attack: How to protect your business

Lessons from the SolarWinds attack: How to protect your business

By the time it was discovered in December, the SolarWinds cyber attack had evaded the security defenses of and penetrated at least 18,000 government agencies,…

5 minute read

The HAFNIUM Attack on the on-premises Microsoft Exchange Server

The HAFNIUM Attack on the on-premises Microsoft Exchange Server

On March 2, Microsoft announced that its on-premises Exchange Server had experienced multiple 0-day exploits. Microsoft commented: “In the attacks observed, the threat actor used…

3 minute read

Announcing OpenText Security and Protection Cloud CE 21.1

Announcing OpenText Security and Protection Cloud CE 21.1

Large-scale cyberattacks have recorded a 5-fold increase during the pandemic. The recent SolarWinds breach, potentially the first of many such attacks, is also among the…

5 minute read

After SolarWinds, worldwide governments can trust no one

After SolarWinds, worldwide governments can trust no one

The effects of the SolarWinds attack will be felt for a long time, and will ripple far beyond the government alone. Even though investigations and…

4 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.