Skip to content

New podcasts: Safely scanning OT environments with runZero

The OT (Operational Technology) sector faces significant challenges when it comes to network scanning. OT systems frequently utilize proprietary protocols that may not be compatible with legacy scanners. Consequently, this incompatibility significantly hinders the effective scanning and information gathering from OT devices. As a result, the asset inventory obtained is often incomplete or inaccurate, posing a major security risk.

Fortunately, runZero avoids aggressive scan tactics, which could destabilize certain IT and OT devices. With runZero, organizations of all types can safely create comprehensive and detailed asset inventories without any disruptions.

How does runZero safely scan OT environments?

runZero employs an innovative incremental fingerprinting approach specifically designed to identify and handle fragile devices effectively. When a fragile device is detected, the method is automatically adjusted to ensure safe scanning. Unlike other scanners that may utilize security probes, runZero’s proprietary scan technology solely utilizes well-formed IP packets. This approach eliminates the risk of disrupting critical operations or causing downtime.

Thanks to its unique and reliable method, runZero has garnered a large and satisfied customer base in various industries including manufacturing, energy, and healthcare. These customers confidently conduct regular scans in their OT environments without encountering any issues.

For a more in-depth understanding of runZero’s approach to OT environments, we invite you to listen to the two podcasts below, featuring runZero founders HD Moore and Chris Kirsch, respectively.

runZero’s approach to scanning ‘fragile devices’ – HD Moore and Dale Peterson on Unsolicited Response podcast

In this episode HD Moore and Dale Peterson spend the first third of the show talking about Metasploit; early reaction, OT modules, and whether Metasploit is still necessary and useful today.

The conversation then shifts to creating asset inventories in IT and OT environments, a core feature of runZero.

Below is a summary of the main talking points in this podcast:

  • Why HD decided to run back into the cybersecurity startup world?
  • How it started as a solo shop with HD writing all the code.
  • How HD thinks Shodan and runZero are different.
  • What technique runZero uses to ‘scan’. A term that many fear in OT.
  • The OT reaction to this type of scanning.
  • What role uses the runZero product?

runZero adds passive scanning for OT networks – Chris Kirsch on the Risky Business podcast

In this Risky Business News sponsor interview Tom Uren talks to Chris Kirsch about how runZero has evolved from an IT network active scanning product to one that can now discover assets on OT and cloud environments using both active and passive scanning approaches.


Play runZero OT minesweeper and win a prize!

There is still time left to play runZero’s OT Minesweeper!

The top three players will win one of the following prizes:

  1. Flipper Zero
  2. Bash Bunny
  3. Alfa Wifi Card

runZero is safe for OT environments, but legacy scanners are not!

In this game, you are a legacy scanner with 30 seconds (and ten total attempts) to recon the network without getting noticed in the fastest time. Just don’t crash any OT devices!

Play OT Minesweeper!

  • Promotion ends: August 11th 2023 at 11:59 pm CST
  • Winners will be announced at DEF CON 2023

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

The Security Compliance Conundrum: Adapting to the Era of IoT, Hybrid Work & AI

The rise of the Internet of Things (IoT), the adoption of hybrid work models, and the integration of artificial intelligence (AI) have revolutionized the way organizations operate. As we embrace the endless possibilities brought by these technological advancements, we must also confront the complex challenges they present, especially concerning security compliance. In an era where traditional security practices are no longer sufficient, organizations must re-think their approach to security compliance to safeguard their data, infrastructure, and reputation. 

Securing the Vast Web of IoT Devices

The Internet of Things has woven an intricate web of devices, from smart thermostats to industrial control systems, connecting previously isolated environments. While this interconnectedness enhances efficiency and convenience, it also introduces a multitude of security vulnerabilities. Each connected device becomes a potential entry point for cybercriminals to infiltrate the entire network, causing devastating consequences for businesses and their customers.

As organizations integrate IoT devices into their operations, security compliance must move beyond a mere checkbox exercise. A dynamic and proactive security strategy becomes imperative. This includes continuous monitoring of IoT devices, ensuring timely updates and patches, and enforcing robust authentication and encryption mechanisms. Moreover, organizations should adopt a comprehensive risk management approach that actively assesses potential threats and their potential impact.

Hybrid Work is Here to Stay

The recent surge in hybrid work models has further accentuated security compliance challenges. Employees now access corporate resources from various locations and devices, blurring the boundaries of the traditional security perimeter. As remote work becomes the norm, the once-familiar security controls must adapt to this new paradigm.

Organizations should prioritize establishing a robust remote access infrastructure, employing multi-factor authentication, and encrypting data both at rest and in transit. Implementing a Zero Trust approach, where access is continuously verified regardless of the user’s location, is crucial in this hybrid work environment. Security awareness training for employees also becomes paramount to instill a security-first mindset, emphasizing their role in safeguarding sensitive data.

The Rise of Artificial Intelligence

Artificial Intelligence, with its transformative capabilities, brings both promise and peril to the security compliance landscape. AI technologies can strengthen defenses by detecting anomalies, predicting threats, and responding in real-time. However, they can also be exploited by malicious actors to launch sophisticated attacks and evade traditional security measures.

Organizations must recognize that AI is not a panacea but a double-edged sword. They must adhere to robust ethical guidelines when deploying AI-powered security solutions, ensuring transparency, fairness, and accountability in their implementation. Additionally, cybersecurity teams must be well-equipped to understand and combat AI-driven threats. Upskilling security personnel to work in tandem with AI technologies is vital to leverage the full potential of these innovations securely.

Furthermore, the convergence of IoT, hybrid work, and AI creates an entirely new breed of security challenges. For instance, IoT devices equipped with AI capabilities can lead to autonomous decisions and actions. While this enhances efficiency, it also means that security decisions may be made without human intervention, raising concerns about unintended consequences and potential security risks.

Where Do We Go From Here?

Organizations must embrace a holistic approach to security compliance that spans the entire lifecycle of these interconnected technologies. This includes conducting thorough security assessments during the procurement and deployment phases, monitoring their operations continuously, and employing incident response plans tailored explicitly for this unique combination of IoT, hybrid work, and AI.

To navigate these complex waters, collaboration is key. Industry-wide efforts to share threat intelligence and best practices can strengthen security compliance across the board. Government agencies, academia, and private enterprises must work together to develop comprehensive standards and regulations that keep pace with technological advancements while promoting innovation responsibly.

As IoT, hybrid work, and AI continue to reshape the modern business landscape, organizations must re-think their approach to security compliance. A proactive and adaptive security strategy, emphasizing continuous monitoring, risk management, and employee awareness, is crucial in mitigating the emerging risks. Additionally, organizations must embrace ethical AI practices and collaborative efforts to strengthen security compliance across industries. Only by taking a unified and forward-looking approach can organizations protect their assets and stay one step ahead of the ever-evolving threat landscape in this brave new world of technology.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

The incredible secret life of software: What do they do when no one is watching them?

Today, on Pandora FMS blog, we’re going to get parabolic, not like the antennas flooding your city’s skyline corrupting the sky with their 3G poison, no. Parabolic parables. Like Yisus. 

Thus, through a sweet story that your mental voice will read in a engulfed way, we will reach an incredible inflated conclusion of moral and good vibes. Let’s get there with the narration about the secret life of software!

The secret life of software: mischief and monitoring

There was once a little software called Glitchinator that worked in a boring office of a gray and monotonous building. The decoration was as exciting as a chess contest:

  • A coal gray carpet.
  • Ash gray walls
  • Smoky gray curtains…

The air conditioning made a somewhat particular noise, something between some frozen fries thrown suddenly into the pan and a symphony orchestra that plays the same note over and over again. The rest of the software employees, CrashMaster, Crisistracker, FaultFinder… walked through the room like zombies with blank eyes.

People did not speak, only dipped their tea bags of chamomile and emitted sounds very similar to the redundant typing of a 21st century typewriter.

“If you’ve ever wanted to experience what it would be like to work in a tomb, this office is the perfect place for you.”, Glitchinator used to say.

Of course Glitchinator felt trapped in a routine of coding and programming, with no excitement or adventure in his life. It was all about washing peripherals, ironing the screen, polishing icons… and on Sunday mornings vacuuming the hard drive.

But something changed one night when all the employees went home and Glitchinator, for the first time, was left alone in the office after returning from a walk on the terrace to some files.

“Why let your files be sedentary?”

Right there gray started taking on color and Glitchinator felt free.

What to do now that no one was watching him, that no one was judging him?

Could… could… could it become a naughty show?!

“Hell yeah!”

So he went crazy. He took off his shirt, rolled up his pants and changed all the fonts in the Word documents on his partner Boris DefectDestroyer’s computer, which left him moderately baffled the next day.

Afterwards, he became emboldened and changed the icons on the desk of the boss’s PC, Mr. MalwareMangler, which left him equally confused. He always likes to have the trash icon at the top right corner of the screen.

But that wasn’t enough for Glitchi.

He wanted to do something even bolder. So he decided to pay a visit to the printer, there he lowered his pants and began to print sheets with “funny” images:

  • Pictures of kittens with birthday hats.
  • An avocado with headphones,
  • And a hundred memes with phrases like “I’m compiling, please don’t talk to me”, “Keep Calm and Debug On”, “Error 404: humor not found!”.

He left them scattered all over the office.

Glitchinator felt like a fish in water, at its own pace, without any restrictions. But what he didn’t know is that his secret affair wasn’t going to last that long.

The S.W.A.T. team descended through the cork panels of the office roof and pointed their open-source lethal weapons at Glitchi.

Someone made the phone call.

Fortunately for Glitchi, after the illicit beating, the toughest guy among IT’s S.W.A.T. team found one of Glitchi’s “antics” somewhat amusing, I believe it was the avocado with headphones.

It was hilarious.

After the pleas and whining of the poor software, the team patted him on the shoulder and told him that it is okay to let go from time to time, to do something that breaks the immutability of daily lives, but as long as it did not endanger the security of his company to the point someone had to call the S.W.A.T.

From that good or bad afternoon, depending on how you look at it, Glitchinator became a model software, always doing what it had to do and avoiding any kind of childishness that could bring him closer to a photocopier.

He even gave up alcohol!

Conclusions

Have you been able to get a glimpse of the lessons of this extravagant parable?

We’ll give you three options.

 

  1. The moral of the story is that monitoring is crucial to keeping computer programs under control. Without it, they can make dangerous roadblocks and put your company’s security at risk.
  2. The moral of the story is that it is important to be open and willing to receive the Word of God. It also teaches us the importance of perseverance and overcoming difficulties.
  3. The moral of the story is that we are all sinners and can make mistakes in our lives, but there is always an opportunity to repent and start over.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

CyberLink FaceMe Facial Recognition Integrates with Simpello to Provide Secure Frictionless Experiences Within Hospitality and Retail

TAIPEI, TAIWAN – July 26, 2023 – CyberLink Corp. (5203.TW), a pioneer in AI and facial recognition technology has announced a collaboration with Simpello to secure and streamline hospitality processes and retail point of sale (POS) experiences. By combining Simpello’s patented, proximity-based reusable identity and decentralized data technology with CyberLink’s FaceMe® Platform and SDK, next-gen experiences are unlocked for customers. 

CyberLink FaceMe facial recognition and Simpello provide frictionless hotel check inSeeking to expedite face-to-face interactions, while protecting customer privacy, hotels and retail locations are turning to Simpello. A proven proximity awareness solution provider, Simpello enables the customer’s phone or device to work as an identifier through a decentralized wallet enabled by Bluetooth Low Energy (BLE) and Ultra-Wide Band (UWB), granting a strict-proximity engagement through a 2’ x 2’ zone for a full host of applications, including POS or hotel kiosk check-in/check-out. With BLE and UWB, customers also have a hands-free way of interacting since their devices can stay safely out of sight.

To take their solution to the next level, and further bolster security, Simpello looked to CyberLink’s AI facial recognition engine, FaceMe. Integrating both FaceMe SDK, a cross-platform facial recognition SDK for IoT and system integration, and FaceMe Platform, an API platform for facial recognition applications, to provide users with a frictionless experience.

With the integration of FaceMe, Simpello’s users benefit from leading facial recognition technology, that boasts an impressive accuracy rate of 99.83%, validated by NIST, and iBeta Level 2 certification for anti-spoofing test assurance and compliance. “Simpello can now leverage the power of biometric identity verification with proximity technology to ensure convenience and security – a powerful combination,” said Simpello CEO Ben Robertson.

Within hospitality, resorts are beginning to deploy solutions that provide customers with the ability to take a selfie with their device when reserving a room online. As part of Simpello’s decentralized data technology, the facial template created from the selfie is then stored on the individual’s phone, and only on their phone, along with a unique token.

Once the guest arrives at the hotel, there’s no need for paper or electronic reservation confirmation. The guest simply approaches the check-in kiosk and presents their face to the camera. If the captured face matches the template on their phone, and the correct token is read, the guest can check-in and make room keys directly from the kiosk, saving them, and staff, valuable time.

Similarly, within retail environments, when utilized at the POS level, a customer needs only to have their phone with them and present their face to pay. Not only is the customer provided with a secure and contact free payment method, but the retail location is also provided with valuable analytics regarding customer trends. “AI is already creating personalized interactions for customers,” said Dr. Jau Huang, Chairman and CEO of CyberLink, “We’re excited that the collaboration between CyberLink and Simpello not only creates richer experiences, but also more secure experiences.”

 

About Simpello
Founded in 2009, Simpello (https://simpello.com) is a leader in decentralizing data by having the client bring their own data to the interaction through a mobile vault enabled by the company. From anonymous to known, Simpello provides a personalized fast and easy interaction/sharing platform that reduces exposure/of institutions by not holding PII data. This provides a new standard of security and privacy never enabled before.

Simpello leverages “reusable” identities via the power of biometric and proximity technology. Reusable identity refers to the ability to use a single set of credentials and data to access multiple systems (interoperability) and/or services providers to allow a reduction of busyness of the customer and institution…a Simple Hello platform…friction to frictionless.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

Cloud security – the truth of the matter, or how it can save your business

Most IT professionals would agree that due to the abundance of remote working possibilities, it has become harder to secure company devices and networks, with more avenues for compromise, be it because of said devices connecting to unsecure Wi-Fi networks, threats to major collaboration platforms or man-in-the-middle attacks. Added to that, the number of IoT devices within and outside the workplace keeps rising, and both data and company networks need to be properly managed and secured.

Cloud security is one of those measures that can save a business several headaches when it comes to remote data, program, or device security. But what does it do, and how can it protect your company?

What is cloud security?

Cloud security refers to the protection of software, data, and infrastructure in cloud computing environments. As enterprises keep adopting more and more cloud services, ensuring their security has become a key consideration.

Cloud services such as Microsoft 365 or Google Workspace offer varied ways to access the centrally managed cloud data depository of apps, documents, and data in general, with company devices sharing these capabilities for a better workflow.

Before COVID, the rise of large collaboration platforms, the global adoption of Cloud 1st and others, it was perhaps easier to manage on-premises security, however because of increased work effectivity and even lower costs, cloud adoption has accelerated in recent years, with some saying that we are still far away from “peak cloud”, signaling that cloud technologies remain the largest value enabler in business technology.

With such a large rise in connected devices, thanks to them making our lives easier and businesses more efficient (allowing for opportunities such as hybrid work), monitoring will need to become more robust and effective, but that is only one part of a working cloud security strategy, as there are many more considerations to be taken into account.

Cloud security is complex, but it doesn’t need to be

Whether we like it or not, businesses, especially IT admins of businesses, are now finding themselves often overwhelmed due to the sheer amount of tasks and IT commitment cloud management requires, with many professionals suffering burnout, with the latter being especially true in the cybersecurity business.

The reason why is obvious, but less so for those without the capacity to analyze such issues, with the day-to-day business often taking away time from these considerations. The truth is that for companies, even those not opting for hybrid work, data security will remain an issue, even on-premises. For businesses with understaffed departments, it is harder to rightly and on time detect and respond to problems that can arise, and even for those with enough staff, security environments can be so complex that delays to critical response can occur, costing firms precious capacity and/or impact business.

The movement to more modern avenues of work has created further incentives and access points for criminals to exploit, and with the sheer amount of apps companies can use to conduct their business, not to mention the abundance of IoT devices (projectors, smart walls, smartphones, laptops, etc.), it is no wonder that now whole supply chains can be targeted.

The complexity that is now a norm has given rise to terms such as alert/alarm fatigue, weariness from constant notifications leading to missed and ignored alerts, resulting in a delayed response.

With this in mind, one needs to ask how cloud security could be made less complex, but also robust at the same time. Apart from having some form of endpoint security protection, enterprises also need to consider the fact that their endpoints can move, and can take their network access and files with them.

ESET has recognized this as an avenue that needs further protection, which is why it offers preventive protection for cloud-based applications such as email, collaboration, and storage. ESET Cloud Office Security (ECOS) provides advanced protection against malware, spam, or phishing attacks with ultimate zero-day threat defense and an easy-to-use cloud management console.

Cloud worries – some mitigation strategies

Starting from ground zero, businesses can have three basic worries when it comes to cloud security; among these, we can count:

1. Risk mitigation:

A company head might want to instill measures to lower cybersecurity risks and maintain business continuity.

2. Data stored in the cloud:

File transfers on company cloud storage can happen between internal and external parties.

3. Ransomware, questionable files:

Usually in the form of infected attachments, malware can have devastating effects on companies.

These three basic worries create enough incentive for companies to pursue stricter security measures, and in essence, all of these underline one single issue, which is the complexity of the threat landscape and the consequences it can bring forward.

However, products like ECOS offer ways one can mitigate cloud threats, specifically those related to Microsoft 365 apps. If you are worried about malware entering your network through infected emails, ECOS automatically submits suspicious attachments to ESET LiveGuard Advanced, isolating it in a cloud sandbox environment, detecting and remediating incoming threats.

For any company to secure business continuity in the case of an attack, informing the employees about threats is almost as important as the protection suite, so cybersecurity awareness trainings are also something to be considered. These lower the chance of human error, both at work and home, in a two-for-one scheme.

But what about cloud storage? Surely, if a company already has file server security protection, it does not need an additional measure to protect cloud-based files. Understandably, server security coupled with endpoint security offers some peace of mind, but since file exchanges can also happen between internal and external parties, it can prove to be dangerous, as cloud storage can spread malware across multiple devices if in use. In turn, additional security for the cloud storage medium should be considered.

Why ESET Cloud Office Security makes sense for businesses

As discussed previously, cloud solutions can be quite powerful and enticing, but they do have their issues, largely thanks to the number of interactions that happen between devices on the cloud network.

To properly secure your online storage, apps, or email, solutions like ESET Cloud Office Security create another layer of defense, mitigating user error both inside the company premises and outside of them.

For a business that is trying to lower the attack surface it can be exposed to, ECOS makes perfect sense, as thanks to its cloud-powered machine learning technology, it offers reliable security for MS365 apps, which are often targeted by bad actors, most famously through infected email attachments, or even by infecting macros.

All in all, it is better to be safe than sorry, and being proactive in cyber defense measures is one way to mitigate the threats of the online working world.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.