Skip to content

ESET uncovers EmissarySoldier: LuckyMouse APT group compromised government networks and private companies (telco, media and banks) in Central Asia and the Middle East

The research featured in ESET’s industry report on government works in concert with perspectives from the European Commission, CERN and Europol presented at the ESET European Cybersecurity Day virtual conference on April 28.

BRATISLAVA – The European Union’s cybersecurity strategy, and that of all governments globally, has been challenged not only in its move to “digital by default,” but also by the COVID-19 pandemic, the mass movement to working from home, and threats such as cyberespionage, ransomware and supply-chain attacks. Above all, the most formidable challenge, and foe, shared by all governments is advanced persistent threat (APT) groups.

APT groups leveraging evolved tools
The ESET industry report on government examines the threatscape APT actors are erecting, and underlines its complex nature with an exclusive look at EmissarySoldier, a malicious campaign brought to bear by the LuckyMouse APT group using its SysUpdate toolkit to compromise machines, some of which were running the popular application Microsoft SharePoint.

This dive into LuckyMouse examines its relatively unknown SysUpdate toolkit – the first samples of which were discovered in 2018. Since then, the toolkit has seen various development stages. LuckyMouse’s current modus operandi is to install its implants via a so-called trident model that uses three components: a legitimate application vulnerable to DLL hijacking, a custom DLL that loads the payload and a raw Shikata Ga Nai-encoded binary payload.

Overview of the trident model

Since SysUpdate’s modular architecture enables its operators to limit exposure of malicious artifacts at will, ESET researchers did not retrieve any malicious modules and expect this to be an ongoing challenge in future analyses. Regardless, LuckyMouse increased its activity in 2020, seemingly going through a retooling process where various features were being incrementally integrated into SysUpdate’s toolset.

The evolution of tools leveraged by APT groups like LuckyMouse is of key concern as governments are vested with the responsibility to ensure stability for citizens, the business environment and engagement with other nation-states. These tasks of governance are under threat as LuckyMouse and other APT groups, including state actors and their collaborators, home in on widespread collaboration platforms like Microsoft SharePoint and digital by default service provision.

Government in focus
The years 2020 and 2021 have seen several ESET research collaborations come to maturity, including engagements with the likes of the European Organization for Nuclear Research (CERN, Europol, and the French National Cybersecurity Agency (ANSSI). Many of their perspectives, shared at the virtual event and in the report, stress that governments and their IT infrastructure exist as default targets.

The report highlights the need for technologists to continue supporting governments in closing security gaps and monitoring the tactics, techniques and procedures of APT groups via the various endpoint detection and response technologies at their disposal. To download the report, visit WeLiveSecurity.com and make sure to follow ESET Research on Twitter.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Pharmaceuticals Like Johnson & Johnson Are Experiencing Daily Cyber Attacks From Nation State Attackers

As each day passes, so does the increasing amount of security risks with the cybersecurity attack vector. Every organization can easily fall victim to another cyber threat, but recently, the pharmaceutical industry has become a prime target.

The increasing number of attacks on pharmaceutical organizations is due to the ongoing COVID-19 vaccine development and distribution and this has resulted in the pharmaceutical sector becoming the most attractive industry for cybercriminals. A successful vaccine has become one of the most valuable intellectual properties for cyber attackers. Beyond attacking the pharmaceutical formula, its data on testing the drug trials have become a tempting target for nation-state attackers

A recent example of pharmaceutical companies being attacked is when the Wall Street Journal reported that North Korean state attackers have targeted pharmaceutical companies in the U.S., including Johnson & Johnson. This sparked the Chief Information Security Officer at Johnson & Johnson to say in an interview that they are experiencing attacks from nation-state threat actors “every single minute of every single day.”

This tale isn’t new as in late 2010 North Korean threat actors reportedly targeted UK-based vaccine maker AstraZeneca whose vaccine was co-developed with the University of Oxford. The attack method was spear phishing via social media intending to inject malware by way of offering AstraZeneca employees fake job offers.

The attack surface of pharmaceutical organizations will only continue to grow and the need for better cybersecurity will become more of a priority as more pharma companies will fall victim which could result in disastrous consequences.

Pharma A Prime Cyber Attack Target

The pharma industry is no stranger to being targeted by attackers. Pharmaceutical companies suffer more breaches than any other industry as a result of malicious activity with an average breach resulting in a loss of over 5 million dollars according to the 2020 Cost of a Data Breach Report. Nation-state attackers are induced to target pharmaceutical firms for financial profit, which was one of the main goals for the cybercriminal group who launched the reportedly North Korean government-sponsored attacks.

Cyber espionage is now being recognized as another influential reason for state-sponsored attackers attempting to gain technological advantage for their countries’ economies. The pharmaceutical industry’s key components are based on innovation with comprehensive R&D investments, intellectual property, and patented data. Anytime any data or property is affected or exploited by an attack it can result in devastating losses which can erode patient and consumer trust.

The 2019 attack on German drug conglomerate Bayer is an example of cyber espionage by a state-sponsored attack. Bayer fell victim to a cyberattack from the Chinese threat actor group known as Wicked Panda. The attackers used the Winnti malware, which makes it possible to access a system remotely and then pursue further exploits once in the system.

Pharmaceutical Intellectual Property Attacker’s Favorite Target

Sensitive information and data are not the only attractive targets of pharma companies that hackers are looking to exploit and gain access to. Nation-state hackers have their eyes on a different prize, intellectual property. Protecting intellectual property has always been a priority for the pharmaceutical industry.

Pharmaceutical products are typically only protected by patent for seven years in the United States, and this data could help foreign generic drug manufacturers to be more ready for the expiration of the patent. For example, Chinese nation-state hackers are targeting US pharmaceutical companies to gather information and share it with Chinese companies to offer an advantage against their western competitors.

The years of research and development into developing new pharmaceuticals have attracted hackers to exploit intellectual property somewhat enticing. Recent attacks have targeted intellectual property such as information related to the development of a vaccine or other medical mitigation measures.

Another risk that many pharmaceutical companies experience is that the technology used in their manufacturing systems is much older than the internet, which results in systems being extremely insecure. They were originally designed as ‘air-gapped’, or isolated systems and not built to confront any cybersecurity attacks. For pharmaceutical companies, any size attack by an adversary can result in loss of productivity and availability of physical devices. This can lead to safety issues, reputation, financial losses, and even death.

To fight off different attacks, and the possible exploitation of vulnerabilities, organizations and more specifically enterprises need to address the need to secure the crucial intellectual property while understanding which devices and technologies are at risk. This starts with increasing awareness of nation-state attacks and adopting a more proactive approach to cybersecurity.

What Pharmaceutical Firms Can Do

Pharmaceutical firms need to allocate the right amount of attention and resources to understand what they can do to protect the company’s data and system. The first step is understanding the different risks that come with pharmaceutical manufacturers and systems and what steps are needed to ensure better security.

With the increased attention and awareness of state-sponsored attacks over the past few years, pharmaceutical companies now are understanding the importance of implementing the right security practices when it comes to securing their IT and OT systems. As pharmaceutical manufacturers move forward digitally and continue to modernize their processes with more robotics and IoT technologies, this creates new entry points for attackers to exploit and move laterally within an organization’s system and servers.

In the past, most manufacturers were using stand-alone systems, but with the advancement of technology, they are increasing their connections to the internet to allow third-party contractors and vendors to gain access to work with their equipment. This has forced the security teams at pharmaceutical companies to change their approach to securing their product.

While not every pharmaceutical company has changed its security approach, there has been a massive increase in awareness which has led to changes in the industry. Some companies, like Taro and Rafa, have taken a more proactive approach when securing their connected OT environments with a passive network monitoring solution, specifically designed for OT environments. This has allowed them to have full visibility into their network, reduce the risk of operational downtime, improve their network security and comply with demanding industry regulations.

As pharmaceutical organizations continue to be on the radar for cyberattacks, now is the time to take action and detect and mitigate any risks. Having the right approach and strategy in place with the right blend of awareness and technology, pharmaceutical organizations can now implement the right approach to securing their data, servers, and intellectual property against cyber attacks.


How SCADAfence Discovered Targeted Ransomware In A Pharmaceutical Facility

SCADAfence’s Incident Response team recently assisted a big pharmaceutical company with an industrial cybersecurity emergency. This research has been published with the goal of assist organizations to plan for such events and reduce the impact of targeted industrial ransomware in their networks.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SCADAfence
SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world’s most complex OT networks, including Europe’s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.

How are businesses of different sizes using FinTech solutions?

For the purposes of this blog, we have categorized small businesses as comprised of 2-49 people, medium as comprised of 50-499 and large as comprised of 500+.

Small and medium-sized enterprises (SMEs) have long been underserved by traditional financial providers. Yet, over the past few years, we have seen new FinTech offerings come to the marketplace designed specifically for small-scale operations. FinTech is no longer a choice restricted to the big corporations. We have seen innovative ways to make payments, manage money and get financing for businesses of all sizes.

Indeed, FinTech companies are broadening their offerings by designing solutions for small businesses. In return, small businesses are actively investing in new technologies, with 42%, in a recent ESET survey, aiming for better security of their finances. While this may not be quite as high as medium (80%) and large enterprises (81%), it seems that COVID-19 has acted as a catalyst, with the survey also finding that 62% of small businesses believe the pandemic has increased the need for improved security of finances.

The benefits for businesses investing in FinTech include reduction of costs, ease of use and lower barriers to entry. However, as the size of an organization naturally correlates with the budget available to spend on new technologies, here, we take a look at how different-sized enterprises have chosen to prioritize their use of FinTech solutions.

Online payments and accounting take the lead
It is perhaps no surprise that accounting functions like online payments and invoices showed the highest adoption rate for businesses of all sizes. From a list of various FinTech solutions, online payments was the most widely adopted by small (46%), medium (58%) and large (59%) businesses alike. This was closely followed by online accounting (small 41%, medium 57% and large 53%), online invoice financing and discounting (small 31%, medium 49% and large 47%), and online cashflow management (small 28%, medium 48% and large 45%).

Clearly, digital accounting has become a significant tool for small businesses, due to the benefits of streamlined systems, increased speed and productivity, and improved data security. Contrary to the notion that it is unnecessary for SMEs to digitalize due to their small scale, SMEs stand to benefit massively from adopting digital technologies to increase productivity, as well as to secure data and financial processes during recovery from the pandemic.

Big fish go for forward-thinking technologies
Where we see the medium and larger organizations storming ahead with their focus and investment is in the more forward-thinking FinTech solutions. So, while small businesses are dipping their toes in digitizing their accounting functions, medium and large businesses are further ahead in their use of branchless banks, online lending, InsurTech and RegTech.

Of these four forward-thinking technologies, InsurTech was the most adopted by medium (40%) and large (36%) businesses. According to a report by Deloitte, the pandemic shifted priorities toward increased investment in InsurTech because of the technology’s promise of “bolstering virtual customer engagement and operational efficiency.” The report states that “the amount of money invested in InsurTechs during the first half of 2020 remained remarkably robust, at nearly $2.2 billion.”

The COVID-19 pandemic has shifted the focus of all businesses, with many prioritizing plans to reduce costs, increase productivity and secure finances. FinTech solutions can offer a helping hand; it’s reassuring to see that some small businesses are benefiting as well.

For more information on how ESET can help businesses, head to our business solutions page

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Violence and Redemption: SNMP Protocol History

You know what it is, but do you know SNMP protocol history?

There was a dark time, more than dark, sepia or beige, in short, that tone in which we find the photos of our grandparents inside the drawer of the oldest and worst decorated closet in our house. A time that is hardly talked about anymore, but that points us as a weapon so that we continue to keep it in our memories. Those were the times of bank robbers and speakers, old rolls, borsalino hats and cameras with lightbulbs, they smoked more, the police were still called “coppers” and toothpaste brands had not yet produced any flavored toothpaste, not even menthol. We go back that far to get to know more about SNMP protocol history.

In this house, Pandora FMS blog, we had already talked before about the relation of the SNMP protocol with the noir part of life. It was hard, few reported that case, but we got to the media, and they, from Newcastle Tribuna to the smallest local newspaper, have endlessly asked us to come back and delve into the subject. That is why we want to make a little review of SNMP protocol history, a story full of caramel nuances and fish bones, swimming pools on the outskirts and tombs in the desert, long and slender legs and hard knuckles like the piles of prelates or pontiffs.

Naaah, in fact, if we want to find out SNMP protocol history and its evolution throughout the years, we just have to go back a couple of decades, no more. In 1988, we started having some news for the first time about this famous protocol. The 80s, pal, a very hard time too, we don’t want to take away any of its prominence. Leg heaters, carded hair and Mustangs ruled. It was around this time that what we know as the first data networks began their journey. More and more “cooler” and more and more widespread around the world.

At that time, with an administrator it was enough for an “analog” or manual way to understand a whole network infrastructure of a company. You can guess the kind of network infrastructure that could exist in a company at that time… It was made up of scarce resources or equipment because the immeasurable variety of services that are provided today did not exist, nor users, nor anything similar.

It was not until more or less the arrival of the 2000s, time of Nokias with poly tones, the return of the bell bottoms and the consolidation of Britney Spears at the highest levels of the music scene charts, that computers, Big Daddy (Internet) and the rest of the technology reached the necessary parameters to accommodate things as far ahead of their time as the SNMP protocol.

The range of services and possibilities was that expanded thanks to convergent networks that we were finally able to handle all kinds of information and data, including voice and video. Infrastructures were expanded by force, and users began to flock like flies to honey. A failure in the system could no longer be accepted. The stakes were high.

That was the time for the proliferation of monitoring systems, yes, like Pandora FMS, owner and master of this blog and my skin. They were shown as essential gadgets for the tasks of technology departments of any company that wanted to stay safe from possible incidents and even anticipate them by detecting them in advance. Monitoring systems, servers, applications, networks, events and a long list of devices. Collecting information, just what we wanted to monitor, all to collect it and represent it visually, in order to carry out the necessary actions that our systems might require. What a monitoring progress!

Like coffee, a morning shower and the geek figures in the office, it is impossible to remove monitoring systems from the daily lives of network administrators, and most of these systems are based on the Simple Network Management Protocol, also known on the streets as the SNMP Protocol, which makes the exchange of management information between network devices easier and fills our lives with hope and management data.

And this is the thick and outrageous SNMP Protocol history. in fact, it has stayed with us for many years. From that first version to SNMPv3, so focused on security and administration… And for many years more old friend! I personally hope you see my grandchildren grow old and I see you get implemented in a crass, ineluctable and ad infinitum way!

Some of the sources used for this article:

https://en.wikipedia.org/wiki/Simple_Network_Management_Protocol

https://coreun.com/2020/07/08/la-monitorizacion-protocolo-snmp-y-su-evolucio

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Earth Day: Recognizing the impact of tech on the environment

Every year since its inception in 1970, Earth Day has been celebrated on April 22 with a clear mission: to educate about the environment.

Society has changed dramatically in the past year, let alone in the 51 years since Earth Day began. One huge aspect of this transformation is the increase in technology use. In 1970, for example, there were no mass-produced mobile phones, whereas in 2021, an estimated 3.8 billion people now have a smartphone.

In terms of environmental damage, some is easy to see: landfills chock-full of single-use plastics, factories pumping out volumes of emissions, and inordinately huge areas of deforestation. However, significant harm is also caused by less obvious sources, including the habits we undertake every day with our technology. The harmful impacts of technology on the environment can result from issues such as planned obsolescence by design, unrepairable devices, and energy use – whether that of individuals or of data centers.

It’s easy to forget about the natural world when we go online – the internet and the environment can seem worlds apart – but to tackle the issues affecting the earth’s environment negatively, we must recognize the role of technology.

There is no one figure to sum up the impact of digital technologies on the environment, but estimates suggest that the technology sector represents at least 1.4% of global greenhouse gas emissions, and could potentially be as high as 5.9%. A significant contributor is data centers. While saving files to the cloud may seem like an innocuous activity, this isn’t a magic disappearing act – the information is stored in data centers, which currently account for around 2% of total global electricity consumption. (Some of the methods of reducing the impact of data centers may surprise you; for example, some are now being built underwater to reduce the cost of cooling them.)

The impact of physical structures is not the only environmental cost of technology. Software also plays an important role, for better or worse. When your device runs slowly, it is annoying – you’re trying to get things done and we have become used to instant responses. Beyond the personal, programs that slow down technology or have a high system impact contribute to environmental damage in multiple ways. Devices require more energy to run when software is slowing them down, meaning shorter charge cycles and greater electricity usage. Additionally, the “replace, not repair” mentality leads many people to dispose of slow devices, which often end up in a landfill.

While it may seem like all bad news, this is certainly not true. Software with low system impact helps devices run quickly, reduces energy usage, and minimizes environmental damage. New technological advancements such as solar glass and the use of environmental sensors can benefit the environment. The presence of technology in our lives is not going away anytime soon, nor should it, but we can pay attention to improving existing tools and minimizing harmful impacts.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Everything you need to know about Office 365 Monitoring

Do you know everything about Office 365 Monitoring?

Microsoft Office 365 Monitoring (Known as Office 365)

Pandora FMS is a proactive, advanced and flexible monitoring tool which is also easy-to-configure according to each business and their needs. It can be integrated into all the needs of servers, network computers and terminals. Besides, in a world where the cloud has taken more prominence, it can also monitor its services or computers.

In this article, we will focus on Office 365 monitoring from Pandora FMS using the module available in the Enterprise library.

https://pandorafms.com/library/pandora-office-365-monitoring/

What is Office 365?

Microsoft 365, also known as Office 365, is the tool conceived by the giant Microsoft that allows you to create, access and share documents online with different users in Word, Excel, PowerPoint and OneNote, among others. To that end, you only need to have access to the Internet and have OneDrive of course.

Microsoft 365 offers different packages, depending on the size of your company or the number of users who will make use of these services. In addition, users may choose between three types of packages: for private use, for businesses or for students or teachers. Each one has its own features (number of users, integrated programs, space…) and it is offered at different prices accordingly.

Microsoft 365 Health

Microsoft 365 provides a page to see the health of cloud services. You may take a look at the following url:

https://status.office365.com

Office-365-monitoring

You may observe the health status of the services in Microsoft 365

Office-365-monitoring

What we can see is that, on demand, we can find out in what state the services are, but by having Pandora FMS, we will be able to improve this overview and also have all of this information and generate alerts about the services that may be essential for the daily work or tasks of our company.

Microsoft 365 in Pandora FMS

In order to carry out Office 365 monitoring, what we need is to be able to see the services in our Pandora FMS WEB console, as exemplified in the following image:

Office-365-monitoring

To get that result, we are going to use the Enterprise library module . But first, let’s take a look at the requirements you need to meet to achieve our goal:

  • In Pandora FMS Environment: The plugin server must be enabled, Python 3.8.
  • In Microsoft 365: Read permissions are required for the o365 API.

Office-365-monitoring

  • Know the following Authentication data: TenantID, ClientID, Secret

The plugin is designed to run as a server plugin but can be run on an agent using module_plugin with no issues at all.

Script Running

So that you can notice, very simply, how the script is executed, we are going to see an example of that, where we will execute its binary version with the following command:

pandora_o365 -c xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx -t xxxxxxxx-xxxxx-xxxx-xxxxx-xxxxxxxxx -s xxxxxxxxxxxxxx~xxxxxxxxxx~xx~xxxxx

Office-365-monitoring

When executing the script, if the ClientIT, TenantID and Secret values are correct, we will get the following response:

Office-365-monitoring

Finding out the status of the services from Pandora FMS

We already have Microsoft 365 service agents, to finish up this idea let’s look at a service on Microsoft 365 health page and what it looks like in Pandora FMS.

Microsoft 365 Health Page:

Office-365-monitoring

Office-365-monitoring

We clearly see that there is a service degradation.

Health in Pandora FMS:

Office-365-monitoring

Office-365-monitoring

We check and verify that, indeed, we have the same information and that with these texts it is very easy to define alerts on the status of the different services.

Log collection

If we have Pandora FMS Syslog Server feature enabled, we can save all the issues that take place in Microsoft 365. For this, just add the parameter -l in the execution of pandora_o365 module -c xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx -t xxxxxxxx-xxxxx-xxxx-xxxxx-xxxxxxxxx -s xxxxxxxxxxxxxx ~ xxxxxxxxxx ~ xx ~ xxxxx -l

That way you can save, very easily and with no issues at all, Microsoft 365 incidences in Pandora FMS.

Office-365-monitoring

Office-365-monitoring

That way, you may now proactively monitor all Microsoft 365 services. And we achieved our goal, Office 635 monitoring is ready to work!

Would you like to find out more about what Pandora FMS can offer you? Find out clicking here .

If you have to monitor more than 100 devices, you can also enjoy a FREE 30-day Pandora FMS Enterprise TRIAL. Installation in Cloud or On-Premise mode, you choose!! Get it here !

Last but not least, remember that if you have a reduced number of devices to monitor, you can use the Pandora FMS OpenSource version. Find more information here .

Do not hesitate to send us your questions. Pandora FMS team will be happy to help you!

And if you want to keep up with all our news and you like IT, releases and, of course, monitoring, we are waiting for you in our blog and in our different social media, from Linkedin to Twitter not forgetting of course Facebook . We even have a YouTube channel, and with the best storytellers.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

5 ideas on how to use a Wireless Document Camera to improve your lecture

The IPEVO VZ-X , a wireless document camera, is revolutionizing how lectures are taken. The VZ-X features three connection modes, namely Wi-Fi, HDMI, and USB. You can also use it with a computer, iOS/ Android devices, or directly with a projector or TV.

Now, let’s look at five ways you can use the IPEVO VZ-X to improve your lecture.

  1. Interactively in a small classroom

Say you are teaching a small classroom and you fancy showing each student’s work to the members of the class. All you need is the Wireless Document Camera, VZ-X, and a big screen. You can hold the VZ-X in your hand, walk around the class while showcasing it on the big screen.

Thanks to the Wi-Fi connectivity, you won’t have to deal with wire, and with a battery life of up to 12 hours, you can have a productive and interactive class or session without interruption.

  1. For a bigger setting

When in a bigger setting, the VZ-X can also be utilized. Thanks to the Wi-Fi mode, speakers can connect their device to the VZ-X and move around freely without having to worry about cables. So, that way, speakers can have their work displayed on bigger screens in the auditorium for all to see.

  1. Online learning

You can also use the VZ-X as a webcam for video conferencing or remote learning/teaching via third-party communication software like Zoom, teams, and skype. You are not restrained by cable as you can connect the VZ-X to your device through Wi-Fi without interrupting your internet connectivity.

To stay connected to your network while using VZ-X in Wi-Fi mode, see the step-by-step guide here.

  1. Connect wirelessly to your iPad and make annotations with the help of the IPEVO WHITEBOARD

With both the VZ-X and the  IPEVO WHITEBOARD App, you can take learning and presentations to the next level. With IPEVO Whiteboard, you can expand your wireless freedom to the maximum. It is a software that lets you make and share annotations, pictures, objects, text, and screens even as you present them.

All you have to do is connect the VZ-X via Wi-Fi to an iPad using the IPEVO Whiteboard, and then you can begin to annotate. But that is not all; you can also record both audio and video as well as take snapshots. It is also possible to display through a large audience when you present on a big screen — of course, with no wire to deal with.

Features and tools that make the IPEVO Whiteboard PRO an interesting software include 20 background templates, disappearing ink, browser window, add a map, picture-in-picture, laser pointer, and many more.

  1. Pair the VZ-X with the IPEVO Visualizer

The IPEVO Visualizer lets you display, record, and modify the video feed from a computer camera. When you pair it with the VZ-X, you can begin to visualize things in a new way. You can add additional value to your lecture with features like reading aids, split-screen, picture-in-picture, slow-motion, and many more.

With the reading aid feature, you have access to additional tools like the line marker, highlight strip, magnifier, and masking.

The split-screen feature lets you use more than one camera in presentations for side-by-side comparisons of different materials.

Picture-in-picture is another feature of the Visualizer you will find interesting. For video recording or live presentation, you can use the main window to show your presentation and the pinned overlay window to show yourself talking it through. Slow-motion recording lets you record in slow motion.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About IPEVO
IPEVO makes versatile teaching tools instead of specialized “classroom equipment”.
We go beyond the usual conventions of classroom technology—large, expensive, specialized and complex—to rethink simple and flexible solutions for interactive teaching in today’s classrooms.
IPEVO’s interactive teaching tools empower educators and teachers with radically affordable and compact technology that is simple, intuitive and flexible, so that precious time and resources can be wholly dedicated to teaching. We intend to make educational technology accessible and available to all.

CyberLink Launches PowerDVD 21

Security or uninterrupted work? With Safetica 9.9 you get both.

A healthy balance between tight security and a pleasant user experience has always been Safetica’s priority. With the latest version, DLP blocking policies do not necessarily interrupt users’ work, since the admin can allow trusted users to override DLP policies and perform their desired actions without asking for help. 

Such events are recorded and can easily be audited. Thanks to users’ comments, the admin will be able to understand the context of the events much more clearly. 

User override can be configured for each policy, enabling you to control which situations and users should be allowed this flexibility. 

Control when file content scan is needed and when it is not

When your users repeatedly work with sensitive data and you know they do so in a secure way, there’s no reason why DLP should slow down their work. 

With the new Safetica version, simply create a top priority “allow” policy which describes safe operations, places, and users. Safetica will stop file scanning for such events and will allow users to work at full speed. Simple as that. 

Control data upload to non-company Git repositories

Whether you use Git for managing source code or as a document versioning system, Safetica can now help your users work with Git securely. Work with company repositories remains 100% uninterrupted, but you can easily prevent users from pushing changes and data to non-company repositories. 

Performance and security improvements

As usual, the new version comes with dozens of optimizations and bug fixes, this time focused on backend performance and faster work with records in both Safetica Management Console and WebSafetica.

Safetica Mobile users will surely welcome the increased security of our new iOS certificates. 

Announcing public beta of Safetica 9.10 with OCR!

For the first time ever, we are announcing the availability of a public beta for an upcoming version of Safetica 9.10. It will include Optical Character Recognition (OCR) and brand new content inspection technology.

OCR allows you to inspect scanned PDF documents and image files and protect them the same way as other documents. With the new content inspection technology, you also get better control over what files should be inspected and an extended list of supported file types. 

We have already tested the beta version thoroughly but want to validate its real-life performance on more variable environments. Once we are 100% certain that everything works flawlessly, we will make Safetica 9.10 available to all our customers.

If you’d like to gain access to the public beta version of Safetica 9.10 with OCR, please apply below

Apply for beta Safetica 9.10 now!

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Safetica
Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.