Security

OpenText™ Cybersecurity 2024 Global Ransomware Survey: Supply chain and AI-powered attack fears intensify

In the third annual OpenText™ Cybersecurity 2024 Global Ransomware Survey, we put a magnifying glass to these growing attack techniques and vectors.

October 10, 2024 5 minute read
OpenText MxDR Platform: By the numbers

OpenText MxDR Platform: By the numbers

There’s one thing about data: it doesn’t lie. It’s either on or off, zero or one.  Data protection and threat remediation are like that, too….

4 minute read

Cut the noise. Cue the results.

Cut the noise. Cue the results.

If you faced a worker shortage, wouldn’t it make sense to optimize the time of the employees you do have?  According to the latest report…

3 minute read

The human dimension of cybercrime

The human dimension of cybercrime

It’s called cybercrime, but humans are at its core, and understanding how they operate is essential for combatting their actions.  While traditional cybersecurity tactics focused…

4 minute read

Curbing Insider Threats Today Requires a Holistic Approach 

Curbing Insider Threats Today Requires a Holistic Approach 

October is Cybersecurity Awareness Month. It’s important to exercise sound cybersecurity best practices to protect your organization’s sensitive and valuable information against outside hackers and…

5 minute read

Apple property list parsing with EnScript

Apple property list parsing with EnScript

The third blog in the series following on from Using the Generic SQLite Database Parser EnScript in forensic examination of a mobile device, will focus…

6 minute read

OpenText Security eliminates digital blind spots with enhanced threat detection, investigation and response capabilities

OpenText Security eliminates digital blind spots with enhanced threat detection, investigation and response capabilities

Cyber attackers, insiders seeking to use confidential and sensitive information to their advantage, and criminals lurk everywhere – on endpoints, both on and off network,…

3 minute read

Targeted DFIR evidence collections

Targeted DFIR evidence collections

During or after an incident, there may be a need for forensic analysis on the endpoints involved in a breach or compromise. This blog discusses…

5 minute read

Using the Generic SQLite Database Parser EnScript in forensic examinations of a mobile device

Using the Generic SQLite Database Parser EnScript in forensic examinations of a mobile device

In my previous blog, the use of EnScript was introduced as a benefit to extend the artifact reach and add custom parsing for the yet…

5 minute read

Network security: from reactive alerts to proactive threat hunting

Network security: from reactive alerts to proactive threat hunting

In any security-minded organization, there are three ways to prevent or mitigate threats beyond firewalls, passwords or locks. Imagine defending your network as you would…

4 minute read

Mobile device examination with EnCase

Mobile device examination with EnCase

Anyone engaged in DFIR (Digital Forensics & Incident Response) will recognize and understand the field moves and evolves at a rapid rate. There is always…

4 minute read

NetSupport Remote Access Trojan (RAT) delivered through fake browser updates by SocGholish threat actors

NetSupport Remote Access Trojan (RAT) delivered through fake browser updates by SocGholish threat actors

The SocGholish campaign is suspected to be linked to the Russian threat actor known as “Evil Corp”. The threat actors are known to drop HTML…

4 minute read

Discover how to make the world a safer, more secure place at OpenText World 2022

Discover how to make the world a safer, more secure place at OpenText World 2022

Today’s security threats pose many challenges for organizations. Ransomware has evolved, phishing is all too common, and law enforcement agencies have enormous backlogs of crimes…

7 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.

Sign up