Skip to content

ESET launches ESET Cloud Office Security to provide advanced protection for Microsoft 365

ESET, a global leader in cybersecurity, has today launched ESET Cloud Office Security, a new standalone software as a service solution that provides advanced preventative protection for users of Microsoft 365 applications. The software is designed to reflect the modern role of emails and collaboration tools used within organizations.

Microsoft Office 365 is used by organizations all over the globe, with the cloud becoming an integral part of many businesses’ data storage and systems, regardless of their size. With more than 84% of organizations (according to Gartner survey*) using or intending to use Microsoft 365, it is crucial that businesses and their cloud tools are adequately protected. Businesses that leverage ESET Cloud Office Security are protected against incidents caused by email-based attacks or malware and can help employees stay focused on work tasks.

Email is the foundation of modern business communication, yet it remains one of the most effective channels to distribute malware, the consequences of which can be disastrous, especially in combination with the infiltration of collaboration tools. ESET Cloud Office Security provides an additional layer of protection for Microsoft 365 cloud email and storage, ensuring peace of mind for all team members with the automatic protection of new user mailboxes. The solution allows for total control and visibility over threats, with immediate notification when the detection of malware occurs and an easy-to-use web console that allows IT administrators to take immediate action.

* Implementing Microsoft Office 365: Gartner Survey Results and Analysis, 2019, Published: 4 September 2019

The combination of spam filtering, anti-malware scanning and anti-phishing secures companies’ Exchange Online services, which in turn protects communications against malware, minimizes the adverse effects of unsolicited emails on everyday productivity and helps prevent incoming external emails from being used as a channel for targeted attacks. ESET Cloud Office Security anti-malware protection also reacts to any file changes in OneDrive, helping to safeguard your company’s data and mitigating the risk of malware spreading to other devices. Accessible from anywhere, the easy-to-use cloud console also gives an overview of quarantined items and immediately provides notifications when detections occur.

Ján Brunovský, Product Manager at ESET, commented: “Almost every business across the world relies on emails for communication, and yet it is one of the main attack vectors cyber criminals exploit. We are excited to launch ESET Cloud Office Security and to provide a solution that will protect countless businesses and their most valuable interactions and data. Securing email and cloud storage is the linchpin of cybersecurity for businesses, and without a strong foundation of anti-malware protection, organizations are left wide open to attack. We are proud to provide a new, cutting-edge, easy-to-use solution for the broad spectrum of businesses that need to secure their cloud tools.”

For more information about ESET Cloud Office Security click here.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET issues its Q3 2020 Threat Report – remote workers under fire from RDP attacks

BRATISLAVA – October 29, 2020 – ESET, a global leader in cybersecurity, has released its Q3 2020 Threat Report, summarizing key statistics from ESET detection systems and highlighting notable examples of ESET’s cybersecurity research – including previously unpublished ESET research updates. The report and its findings were exclusively presented during the “ESET European Cyber Security Day – Towards a Secure Post-COVID Future” virtual event.

After months of abusing the COVID-19 theme in their campaigns, cybercriminals appear to have returned to their usual tactics in the third quarter of 2020, the Q3 2020 Threat Report shows. An area where the risks remain particularly high, however, is remote work.

ESET telemetry showed further growth in attacks targeting Remote Desktop Protocol (RDP), which grew throughout H1. While the number of unique clients targeted rose by more than a third, the total number of attack attempts surged by 140%. “The continued rise in RDP attacks may be a result of the growing number of poorly secured systems being connected to the internet during the pandemic, or possibly other criminals taking inspiration from ransomware gangs in targeting RDP,” comments Jiří Kropáč, Head of Threat Detection Labs at ESET.

Other key trends observed in Q3 were the revival of cryptominers, Emotet returning to the scene after months of inactivity, and Android banking malware surging following the source code release of the notorious mobile banking trojan Cerberus.

The ESET Q3 2020 Threat Report also reviews the most important findings and achievements by ESET researchers. Among many other findings, they uncovered more Wi‑Fi chips vulnerable to KrØØk-like bugs, exposed Mac malware bundled with a cryptocurrency trading application, discovered CDRThief targeting Linux VoIP softswitches, and delved into KryptoCibule, a triple threat in regard to cryptocurrencies.

The exclusive research presented in the Q3 2020 Threat Report includes campaigns leveraging malicious MAXScripts, the spread of Latin American banking trojans to Europe, new activity of the TA410 threat group and a look into the updated arsenal of the Gamaredon Group.

Besides these findings, the report also recapitulates the many virtual talks held by ESET research specialists in Q3, introduces talks planned for the upcoming quarter and provides an overview of ESET’s contributions to the MITRE ATT&CK knowledge base.

For more information, check out our ESET Threat Report Q3 2020 on WeLiveSecurity.

Make sure to follow ESET research on Twitter for the latest news from ESET Research.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET recognized for giving back to the community with a 2020 Tech Cares Award from TrustRadius

BRATISLAVA – 28 October, 2020 – ESET, a global leader in cybersecurity, has been recognized by TrustRadius with a 2020 Tech Cares Award. The award celebrates companies that have gone above and beyond to provide their communities, clients and frontline workers with support throughout 2020 and during the COVID-19 crisis. While over 100 tech companies were recognized, ESET was one of just two cybersecurity vendors to receive the award.

TrustRadius is the fastest growing review site and insights platform for businesses, helping buyers make better product decisions based on unbiased and insightful reviews. The review site launched the Tech Cares Award in response to the unique challenges that 2020 has posed for tech, and in recognition of the companies who have risen to meet the needs of those around them.

In collaboration with the scientific community in Slovakia, ESET developed the first testing kit for COVID-19 in Slovakia, donating 100,000 kits to the Slovak Republic. Recognizing the importance of education in light of rising cyber crime and a newly remote workforce, ESET launched extensive educational activities for both the general public and expert community around cybersecurity awareness, including Remote Desktop Protocol and VPN security, encryption and backup.

The Tech Cares Award recognizes companies that have contributed directly to combat the virus, either with their products, knowledge or financial support. The award is based on user feedback and TrustRadius community nominations. Users highlighted how the nominated organizations have acted selflessly in support of their customers throughout the pandemic, and the research team at TrustRadius individually vetted each nominee to ensure that their actions met the standard for outstanding conduct and support during the COVID-19 crisis.

This is the second time ESET has been recognized for activities undertaken during the COVID-19 outbreak. The What the Next Normal Will Be Post-COVID-19 report by leading IT market research and advisory firm, IDC, outlined the top 10 changes we can expect, inspired by the initiatives of industry leaders, and also highlighted the support ESET provided during the COVID-19 crisis.

Ignacio Sbampato, Chief Business Officer at ESET, commented, “ESET is immensely proud to have been recognized for the actions it has taken to support businesses and individuals during the COVID-19 pandemic. As a company, we endeavor to put people at the heart of everything we do – whether this is providing specialized educational resources for teachers or extending free trials of our products to support those who may be suffering financially. ESET cares deeply about the communities it serves globally, nationally, and locally and has created a Fund for Effective Diagnosis & Prevention of SARS-CoV-19, initially donating €300,000. We are honored to be among the few cybersecurity vendors to receive an award and will continue to work to give back to the community as we move forward through the Coronavirus crisis and into the future.”

“We are excited to announce our first-ever Tech Cares Award Winners,” said TrustRadius CEO Vinay Bhagat. “This pandemic isn’t just a test of fortitude. It’s an opportunity to distinguish yourself. We have been completely inspired by the way the B2B technology industry responded to COVID-19. So many companies pivoted with grace, leading to many of them standing out in our minds as major community contributors during this time. Not only do we feel that these companies are deserving of recognition — we also consider their example when deciding how we ourselves can find new ways to give back.”

To find out more about ESET’s initiatives during COVID-19, click here.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

RADIUS Change of Authorization (CoA): What Is It? Why Use It?

The RADIUS change of authorization (as defined in RFC 5176) provides a mechanism to change authorization dynamically after the device/user is authenticated. Once there is a policy change for a user, you can send RADIUS CoA packets from the authorization server to reinitiate authentication and apply the new policy.

The RADIUS CoA process allows you to change the user access immediately when needed, without the need to wait for the wired switch or access point to initiate a re-authentication process, or for the device to disconnect and re-connect again.

CoA use cases (for connected authenticated devices) include:

  • Access control policy update, such as VLAN assignment for a group of devices/users
  • Risk/posture assessment policy was updated for a group of devices/users
  • Administrator blocked a device/user
  • Device risk score/compliance changes: Device is out of compliance (such as AntiVirus or firewall was turned off), thus needs to be set to quarantine VLAN or have access completely blocked; Or device is back in compliance, thus needs to be set to the production VLAN.

The CoA process functions as follow:

  • A device is connected to a wired ethernet switch or WiFi SSID after a successful authentication
  • There was a policy update or a change on the endpoint which requires that the device completely disconnect from the network or reconnect with different access than the current one (i.e. different VLAN, apply ACL)
  • The RADIUS server sends the CoA packet to disconnect the device which leads to re-authentication and applies the new access policy

CoA Packets

The RADIUS CoA packet is sent on port UDP 3799 or UDP 1700 – as used by some network vendors.

Disconnect-Request (PoD – Packet of Disconnect) is a request being sent to the NAS – Network Access Server (i.e. switch/access point), in order to terminate the user session/s. As a reply, two packets can be sent from the NAS:

  • Disconnect-ACK – acknowledgment, successful disconnect
  • Disconnect-NAK – negative acknowledgment, disconnect session failed

CoA-Request packet can also be sent to initiate changes on the device or port such as re-authentication and bounce port. As a reply, two packets can be sent from the NAS: CoA-ACK (successful CoA action acknowledgment) and CoA-NAK (CoA failed action). When there’s a need for a VLAN change, using CoA-Request, might not force the endpoint IP address to be released and renew. Instead, it may only change the VLAN. Thus, for implementations that require VLAN change, it’s recommended to use the Disconnect-Request CoA packet which will lead to re-authentication, and for the device to get a new IP address on the updated VLAN.

CoA Disconnect-Request with 802.1X RADIUS Authentication Flow

>RADIUS Change of Authorization Packet Capture

CoA RADIUS codes

CoA PacketRadius Code
Disconnect-Request40
Disconnect-ACK41
Disconnect-NAK42
CoA-Request43
CoA-ACK44
CoA-NAK45

Packets Capture Examples using Wireshark

Disconnect-Request:

Disconnect-ACK:

These packets contain attributes with information on the NAS (wired switch/access point), endpoint involved, timestamp, and a link to the frame of the RADIUS server requests / NAS responses.

RADIUS Change of Authorization with Portnox CLEAR

Using Portnox CLEAR for CoA with dynamic VLAN assignment (previously discussed in Dynamic VLAN Assignment) implementation, allows the administrator to achieve a secure and segmented network for dynamic changes in the environment. Whether it’s an access policy change for a group of users/devices or a compliance change on a specific endpoint, the device(s) will be immediately placed on the relevant network, or blocked according to the policy.

In the following video, we’ll demonstrate a CoA use case of risk violation for a device with Portnox CLEAR. Scenario description:

  • Configure SSID to work with CLEAR services, including CoA.
  • In CLEAR, review risk assessment policy which requires AntiVirus to be up, running, and updated, and access control policy which places devices with risk violation in quarantine VLAN.
  • Connect a device with AgentP (CLEAR agent on the endpoint for risk assessment) enrolled to the configured SSID and authenticate successfully with a certificate.
  • Turn off AntiVirus on the endpoint, CLEAR identify the risk, and send CoA packet to disconnect the device.
  • The re-authentication process starting, and the device is being placed in the quarantine VLAN.
  • Add remediation action to start AntiVirus | AntiVirus is being enabled on the endpoint by CLEAR and the device is back in compliance.
  • CoA process is initiated, and the device is being placed back in the production VLAN.

Author Ran Fridberg

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Broad home office exposes your company data

Download the report now!

Companies close their offices on a large scale and introduce home office for all their employees. Currently, the vast majority of all Czech companies have introduced working from home for up to several weeks. A survey conducted by the technological company Safetica shows, however, that most affected companies are not sufficiently prepared for these steps.

“Ordinarily only a few percent of companies allow home office, and even only for a part of their employees. Working from home to such an extent is an absolutely unprecedented step that, in most cases, has a fundamental impact on the functioning of your company. Many companies are far from equipped and prepared for this step. They are threatening internal data in particular,” said Petr Žikeš, CEO of Safetica, a company focused on company data security.

The most common problems include insufficient equipment for the employees. Up to 65% of all the companies let their employees working on their personal computers.

What the companies should be careful of?

Experiences with data security show that the remote connection option remains a major problem, e.g. using the Remote Desktop Protocol (RDP). Without any other active protection, RDP allows transferring files from the workstation to the home station from which the user is connecting, and thus it allows leaking files outside the working environment.

Experts point out that another critical point is setting the AD-controlled access privileges (see the box below) to specific systems, data, and applications within the company network, which are often not properly configured. A failure to do so may allow the user to access and thus compromise data to which he or she is not supposed to have access.

On average, one in ten companies in the Czech Republic has experienced sensitive data leaks 

In most cases, this is an unintentional behavior caused by negligence. “With the increasing number of people working remotely and even from their computer instead of their employer’s one, the chances of data leakage problems increase,” says Zikeš, noting also a decrease in the productivity being a side effect. “The problem is not only in the use of personal computers and mobile devices to work from home but also the connection to your home Wi-Fi. These networks are easy to break. Your employees often do not even know how to secure their home network,” points out Zikeš, stressing also that Safetica has also prepared a manual on how to prepare the company and its employees for working from home.

He notes that also Safetica has adopted a company-wide working from home: “As a technology company we have the advantage of being much better prepared for this type of work. But this is not the case in every company. This is what has led us to the idea of helping others in this situation. And that is why we have suggested recommendations on what measures to take when working from home.”

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Safetica
Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.

Protecting consumers at every level with enhanced protection for Windows

BRATISLAVA – ESET, a global leader in cybersecurity, has today launched new versions of its Windows security products for consumers. The new versions upgrade the protection in ESET Internet SecurityESET NOD32 Antivirus and ESET Smart Security Premium.

The wide range of security improvements cover malware detection, online banking, password security and smart home support – in line with ESET’s goal to create a safer digital world for everyone to enjoy. With the ever-increasing volume of reported cyberattacks, it is vital that users are secured in their online activities. These product updates address key issues, including online payments and banking-related threats, identity theft and leaking of personal information, stolen passwords and connected device security.

ESET is continuously improving its solutions to ensure that users are equipped with the very latest technologies in cybersecurity while keeping a low system footprint. The updates bring fine-tuning of the Host-Based Intrusion Prevention System and Advanced Machine Learning modules, along with a significant reduction in the size of the Machine Learning module.

Other key updates include the new Windows Management Instrumentation (WMI) and System Registry scanners capable of detecting malware that uses the WMI or the registry maliciously. The Connected Home module is also improved with better connected device detection and security issue troubleshooting.

Financial security is a top priority, and the upgraded Banking & Payment Protection features a special secured browser mode through which users can safely pay online. The new feature allows users to run any supported browser in secured mode by default. With secured mode on, the communication of the keyboard and mouse with the browser is encrypted to guard against keylogging. In addition, Banking & Payment Protection now also notifies users when Remote Desktop Protocol (RDP) is turned on to alert them about the danger of malware abusing RDP.

Finally, ESET Password Manager has been completely rebuilt with new functionalities such as remote logout from websites and remote clearing of browser history, and is available via both browser extensions and native mobile apps.

Commenting on the updates, Matej Krištofík, product manager at ESET, said, “As cyberthreats continue to evolve in sophistication and frequency, it is vital that consumers and their devices are protected on every level. Technology is at the center of our lives, from online banking to connected homes, so it is more important than ever that our personal technology is safe and secure. We are proud to offer our latest Windows security product updates to consumers, reflecting our dedication to consistently improve and innovate in order to provide a safe digital experience for all.”

To find out more about ESET’s home security products for Windows, click here.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

First Israeli Hi-Tech Delegation Takes Off for the Emirates

The first Israeli high-tech delegation to the Emirates departed this morning (Sunday), led by Jerusalem Venture Partners Fund and entrepreneur Erel Margalit. Over the next four days, the delegation is set to hold high-level meetings with senior officials as well as innovation and investment counterparts in Dubai and Abu Dhabi, to build cooperation between Israeli and Emirati hi-tech, and deepen the newly found relationship between the two countries.

Erel Margalit, CEO and founder of the Jerusalem Venture Partners (JVP), February 18, 2019. / Hadas Parush/Flash90

On Tuesday, participants will join first of their kind ’round table’ meetings between entrepreneurs from the two countries– both of which are renowned internationally as leaders in the field. Ahead of the visit, the delegation was honored to have received the warm welcome of the UAE Government and was looking forward to the opportunity to meet senior ministers during the visit.

“Hi-tech is the locomotive engine that leads the Israeli economy, so we have a key role in leading relations and cooperation with the Emirates, with an emphasis on partnership,” commented JVP founder and chairman of Margalit Startup City Erel Margalit.

He added, “I am proud to lead the first Israeli hi-tech delegation to the Emirates. Our companies have been in business contact with the Emirates for a number of years, and now an opportunity has arisen to expand this network of relationships, deepen the ties significantly, and allow more and more Israeli companies and entrepreneurs to be part of this connection and success.”

Margalit stressed, “This is not just a business opportunity, but a political opportunity for a new page between the Israeli hi-tech community and the entire Middle East. With us in the delegation, are the CEOs of emerging Israeli hi-tech companies from every field, and I am sure we will create real partnerships here that will contribute to building successful Israeli companies that will propel the Israeli economy forward, precisely during this period, and create more and more new jobs.”

The delegation was invited to the Emirates by the DIFC (Dubai International Financial Center), the body that manages the free trade area in the financial heart of Dubai – which is one of the global financial centers. Members of the delegation will also receive a comprehensive tour of the financial center.

Among the companies participating in the delegation: Earnix, one of the world’s leading companies in insurtech and personalization of insurance and banking, an area with great interest in the Emirates, which is considered a powerhouse in the field of insurance in the Middle East; Up Control, an emerging Israeli company leading a revolution in the management of remote work networks; Morphisec, from Beer Sheva, which is a leader in innovative technology for protecting endpoints in organizations, which is a particularly relevant development for the protection of banks and infrastructure; and Secret Double Octopus, also from Beer Sheva, which provides a leading biometric solution for passwords.

Also of significant interest to the Emirati Government, companies, and investors is the field of foodtech. Among the delegation in the field is InnovoPro, a company that produces a protein substitute from chickpeas with high nutritional values. One of the most interesting companies in the world in the field, it is already a major player in dairy products in some of Europe’s leading chains, with products from ice-cream to mayonnaise. The company is now preparing for a breakthrough in the Middle East. Another company participating in the delegation is Agrint, which has developed technology to identify diseases in trees before they cause damage. One of the most serious infections in the world is the palm bacteria that destroys entire palm groves. Agrint’s solution for this has significant potential for agriculture in the Middle East.

Members of the delegation included: Entrepreneur, and former senior official in the Mossad, David Meidan; Udi Ziv, CEO of Earnix; FrankZvi, CEO of Copilot; Elad Ben-Meir,-CEO of SCADAfence; Dror Liwer – Co-Founder& Chief Security Officer of Coronet; Asaf Ganot, CEO of Control Up; Omri Kohl, CEO of Pyramid Analytics; Gal Rimon, CEO of Centrical; Ronen Yehoshua, CEO of Morphisec; Raz Refaeli, CEO of Secret Double Octopus; Mark Gazit, CEO of Thetaray; Yaron Ravkaie, CEO of Teridion; Tali Nehushtan, CEO of InnovoPro; Yehonatan Ben Hamozeg, CEO of Agrint; they were joined by JVP partners Yoav Tzruya, Fiona Darmon, Gadi Porat, Michal Drayman, and Rinat Remler, senior VPs Shimrit Kenig, Guy Pross, Pnina Ben Ami, and communications director Omri Sheinfeld.

Source from: https://www.jewishpress.com/news/business-economy/first-israeli-hi-tech-delegation-takes-off-for-the-emirates/2020/10/25/

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SCADAfence
SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world’s most complex OT networks, including Europe’s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.

What’s new in the latest version of ESET’s home Windows offering?

Each year, around autumn, ESET releases a new version of its Windows offering for home customers. This year sees the arrival of the fourteenth version of the home Windows lineup, with a long list of new and improved features for users. With cyberattacks surging massively over the past few months, this update meets users’ need for comprehensive online security in times of uncertainty and increased threats.

Included in the updates are ESET Internet Security, an advanced security solution that brings rock-solid protection for modern web users; ESET NOD32 Antivirus, a fast and light solution that is perfect for gamers and everyday users who don’t want any interruptions; and ESET Smart Security Premium, a comprehensive product built without compromise for users who want it all, including extra data encryption and easy password management. With the aim of creating a safer digital world for everyone to enjoy, version 14 adds a series of new features to these products, along with improvements in malware detection, online banking and password security.

A crucial upgrade was made in the Advanced Machine Learning module, which now has better detection while retaining a tiny footprint. The improvements in the data selection and algorithm components will lead to increased detection of threats, including those transmitted via email. Synchronous Advanced Machine Learning in the Cloud, which runs more heavyweight detection models on cloud platforms, also brings considerable improvements for the detection of new malware.

Similarly, ESET is continually working to improve behavioral detection, with a focus on extending protection across system components that are typically abused by malware. To this end, the Host-Based Intrusion Prevention System, which utilizes advanced behavioral analysis to protect your system from malware and unwanted activity, has also been bolstered with further detection methods. This includes improved detection of ransomware and other malware using suspicious encryption and decryption API calls.

The update also provides users with new protection in the form of the Windows Management Instrumentation (WMI) and System Registry Scanner, which are capable of detecting malicious uses of the WMI and the system registry.

Finally, version 14 also brings changes to Banking & Payment Protection, including a “secured browser” mode through which you can safely pay online. This mode gives users the option to run any supported browser in secured mode by default; after it has been set up, the browser will always start in secured mode. The improved Banking & Payment Protection automatically protects users when banking online and when accessing web-based cryptocurrency wallets. The update encrypts the communication of your keyboard and mouse for safer transactions in your browser, and notifies you when Remote Desktop Protocol is on – a possible sign that malware is spying on you.

For more information about the full list of features included in ESET’s home Windows offering, please see here.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Trickbot botnet grows quieter, Emotet botnet gets busy

Botnets are one of the top cyber threats to look out for in 2020, according to Forrester, and with a dispersed, remote workforce, many organizations may be more vulnerable than ever before. Botnet operations can become incredibly sophisticated, carrying out a wide range of illicit activities: collecting browser information, harvesting passwords, stealing login credentials from banking websites, or deploying ransomware.

One of the most infamous botnets is Trickbot, which has compromised over a million computing devices around the world since 2016. Earlier this month, ESET helped to disrupt Trickbot in a global collaboration with Microsoft and other partners.

ESET first detected Trickbot in late 2016, and it has since been recognized as one of the most prevalent banking malware families across the globe. The botnet has targeted several different industries – including education, real estate and government – but the most frequently targeted seems to be the financial sector. With its capabilities for stealing banking credentials and performing fraudulent transactions, Trickbot is a threat to financial data at any business, so businesses must be prepared to protect themselves against this threat.

Trickbot is extremely versatile, with a modular design that allows it to perform an array of malicious actions using a variety of plugins. ESET analyzed nearly 30 different plugins, of which over a third were infostealers. One of these, named injectDll, uses browser hooks to steal user credentials from banking websites, allowing Trickbot’s operators to perform fraudulent bank transfers and steal money from individuals and organizations. Another plugin, known as pwgrab, steals passwords from Filezilla, Microsoft Outlook and WinSCP. These are just two examples of the damage Trickbot could wreak on businesses once it has infested your systems.

A prolific distributor of ransomware – one of the largest threats to the upcoming US election – Trickbot is also a potential danger to election infrastructure. Operators of the botnet could infest a computer system used to report results or store voter rolls, sowing high levels of chaos and distrust among the electorate. The collaborative operation to disrupt Trickbot helped cut off key infrastructure, meaning that the botnet operators are no longer able to initiate new compromises or deploy ransomware as easily.

ESET telemetry shows Trickbot detection numbers plummeting in tandem with the disruption effort:

Figure 1: Trickbot detection numbers from July to October 2020

While the threat of Trickbot seems to have lessened for now, maintaining vigilance for other botnet attacks is still paramount. At the same time as Trickbot’s disruption, the rising detections in ESET telemetry for the Emotet botnet indicated a ramping up of Emotet’s activities, even downloading Trickbot, as well as Qbot, malware:

Figure 2: Emotet detection numbers from July to October 2020

The Emotet malspam campaign was recently bombarding users in Greece, Japan and Lithuania:

Figure 3: Countries most targeted by Emotet from July to October 19, 2020

Facing such a threat may seem like a daunting task, but there are a few ways businesses can protect themselves from botnet operations. Primarily, it is crucial to protect all endpoints with a security solution that has robust detection modules, such as ESET Endpoint Security. Businesses also need to ensure that their networks are always patched with the latest security updates to avoid falling victim to vulnerabilities that threat actors may exploit. Additionally, remote ports can provide an access point for hackers, so restrict access as far as possible – especially to remote desktop protocol (RDP) ports.

To find out more about ESET’s efforts to disrupt the Trickbot botnet, read ESET takes part in global operation to disrupt Trickbot on WeLiveSecurity.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.