Skip to content

Feel The Flow With Autofill

Why is Autofill so cool?

Nothing is more annoying than manually typing out online forms. Usually, when you sign up for an online service, you need to type out your username, password, personal information, and sometimes even your credit card details. If the website takes security seriously, it may also ask you to prove your identity with additional authentication methods. This is especially true when it comes to online shopping.

So, say you reach the final steps of purchase and you’re already pretty annoyed. Fortunately, Autofill effectively deals with the nuisance of filling out online forms, making it a smooth and seamless experience.

Powered by machine learning, Autofill constantly evolves and adapts, accurately identifying and filling fields in various forms, including sign-ups, logins, credit card details, and personal information. This ensures Autofill remains highly reliable, aiming to deliver perfect accuracy over time.

Pro tips: How to make the most of Autofill

Log in with a single click

Thanks to the Instant Login feature on desktop, NordPass allows you to skip all the annoying steps required to log in to a chosen website: landing on the page, selecting credentials, and performing on-page actions. Now, a single click is all it takes. All you have to do is follow a prompt to log in with NordPass.

If you choose not to log in using the Autofill feature, you’ll be asked if you want to enable it for future access to the website. Choose yes to ensure an effortless login experience. Alternatively, you can leave it disabled or even turn Instant Login off altogether in the NordPass settings section.

If you have multiple accounts on the website, select the account you want to use first. In such a case — let’s be honest — logging in with Instant login takes two clicks.

how to login with nordpass pop up screen

Autofill all credit card details and personal information

Some websites require additional information to authenticate the user or confirm transactions. You may know the case from Amazon asking for an ID to verify your address or an online shop requiring a billing address or security questions regarding your company credit card. We salute every solution that enhances your online security, but looking for and writing down all these additional details can be quite annoying.

Luckily, the Custom Field feature — previously available with password items — is now expanded to credit cards, personal information, and secure notes on desktop and Android devices. NordPass will autofill the data from custom fields added to your items. This way, you won’t have to look for your ID or credit card (if you even have it in a physical form, which is not always the case with business cards) whenever you want to buy something. Handy, right?

how to add custom fields Nordpass dashboard view

Bundle your websites or apps

Having separate password entries for apps from the same company, like Facebook and Messenger, even if you use the same credentials for all, can clutter your NordPass vault. It also takes extra time and effort to manage, especially with multi-domain websites like Microsoft that are frequently used at work.

At NordPass, we focus on the simplicity of use. That’s why we let you combine website addresses on your desktop, or app names on your mobile device, into a single password entry. This feature improves domain matching, making it easier to access your accounts across related domains. For example, NordPass can recognize microsoft.com and live.com as related, so you can access both without duplicating passwords. Instead of searching for each site individually, you’ll find the login details for login.live.com under “Microsoft,” and autofill will take care of the rest.

This feature, available on desktop and Android devices, helps simplify credential management. If you have multiple entries for related accounts with the same password item, you can merge them into one and delete the extras. Just be sure to manually remove the unnecessary entries.

how to add asset with multiple urls nordpass dashboard view

Experience undisturbed flow

The best-in-class user experience takes constant improvements. Take a look at how Autofill makes accessing online accounts easier and quicker.

  • Subdomain matching

The Subdomain Matching feature — available on desktop and Android devices — will prove invaluable if you use multiple subdomains at work (like department-specific sections of a company website). It’s designed to identify and autofill correct login information for each subdomain, ensuring a seamless access experience by removing the hassle of having to select from multiple login options every single time. You can enable or disable Subdomain Matching in the NordPass settings section according to your needs.

how to autofill via subdomain nordpass dashboard view
  • Customizable autofill

You can adjust the autofill settings at any time by clicking the three dots in the autofill drop-down list. This allows you to choose a different item to autofill, search for the right one, or change how NordPass interacts with specific fields. Plus, you can use this feature to give direct feedback to the NordPass team.

customizable autofill feature in Nordpass dashboard view
  • Disable autofill

To disable autofill on specific pages or fields, just right-click the input field and choose “Don’t autofill on this website” or “Don’t autofill this field.” This way, you can control when autofill is used, keeping your workflow smooth and uninterrupted.

how to manage autofill Nordpass dashboard view

What else to expect?

The Autofill may have already suggested using Email Masking or a Password Generator tool during the login process. Please note, that you can take advantage of both without leaving the page; NordPass will automatically save your new strong passwords as well as email masks.

email massking input field Nordpass dashboard view

On Desktop, we’ve introduced prompts to inform you in case you enter an unprotected website or log in with weak or reused passwords. The prompts can also warn you about breached websites to help you secure your accounts and resolve the breach on NordPass. However, if you don’t want to get these, you can now turn them off permanently in the “Notifications” settings section.

data breach scanner and password heath checker features

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

The dynamics of cyber insurance and ransomware mitigation

In today’s cybersecurity landscape, ransomware is now a major threat across all sectors, and while prevention is key, effective mitigation is equally critical. That’s where cyber insurance comes into play — it’s an important way to mitigate some of your most significant risks. Let’s look into the trends in ransomware, the state of cyber insurance, and the role of cyber insurance in ransomware mitigation.  

The growing threat of ransomware

I think it’s safe to say that ransomware has evolved significantly over the years. What was once a sporadic threat has now become a persistent and pervasive risk for organizations worldwide. According to a recent ESG (Enterprise Strategy Group) report, “Lighting the way to readiness and mitigation,” 89% of enterprises consider ransomware one of the top five threats to their viability, highlighting the widespread concern that ransomware attacks can disrupt operations, compromise sensitive data, and result in significant financial losses.

One of the most striking trends in the ransomware landscape is the rapid increase in the number of identifiable ransomware groups — not entirely unlike the early days of the automotive industry where a small number of manufacturers eventually grew into a large, competitive market through new entries, consolidation, and expansion.

Similarly, the ransomware market has expanded as new threat actors emerge, gain success, and attract attention. While some of these ransomware groups are eventually shut down, others continue to thrive, contributing to an alarming 55% year-over-year growth in ransomware attacks.

The financial incentive driving ransomware

Just as with other forms of cybercrime, ransomware threat actors are motivated by the potential for substantial financial rewards. When people have a financial incentive to do something bad, they’re often going to do that thing. And since there’s a lower barrier to entry in the ransomware market than ever before — especially when utilizing options such as ransomware as a service (RaaS) — almost anyone with a basic understanding of technology and a desire to make money can participate.

Read ransomware-as-a-service blog

This has led to a proliferation of ransomware groups, each looking to capitalize on the lucrative opportunities that cyber extortion presents. According to a Reuters report, ransomware generated over $1 billon USD in 2023 alone.

 

Geopolitical factors also play a role in ransomware activity. Some countries are known to harbor, or at best ignore, ransomware gang activities in their countries, and there’s evidence of state-sponsored ransomware attacks, too. All of these attacks share a primary focus: Generating revenue through ransomware.

Looking at the graph above, geopolitical factors seem to be a plausible explanation for 2022 — the year Russia invaded Ukraine — being an anomalously slow year regarding generating ransomware revenue. And in 2023, a historically high peak, representing a 140 percent growth from 2022, according to Statista.

The role of cyber insurance

Because you can’t guarantee that you won’t be able to prevent every attack, cyber insurance has become an essential component of an organization’s risk management strategy. While it is not a substitute for robust cybersecurity measures, cyber insurance helps organizations mitigate the financial fallout from a ransomware attack.

Of US organizations polled, 58% reported either opting in to one or more cyber-insurance policies or planning to do so in the next 12 months to mitigate their ransomware risk.

The cyber insurance market has evolved significantly in recent years. Initially, obtaining cyber insurance was relatively simple; businesses could secure a policy with minimal requirements. However, as the frequency and severity of ransomware attacks have increased, insurance companies have raised their standards.

As a result, there are new hurdles for businesses to overcome. Escalating rates, additional cybersecurity requirements, and limitations in coverage all make it more difficult for many organizations to acquire insurance. More than half of those surveyed have reported difficulties meeting underwriter cybersecurity requirements to acquire a policy. Today, insurers require organizations to demonstrate a certain level of cybersecurity maturity before they can qualify for coverage.

These controls include key items such as multi-factor authentication (MFA), endpoint detection and response (EDR) solutions, and robust backup systems. Put bluntly, you cannot get an insurance policy without implementing the controls your insurer expects to see.

The state of cyber insurance

As cyberthreats continue to evolve, so does the cyber insurance market. As I mentioned, insurance companies are now paying closer attention to how organizations manage data security and privacy, particularly in light of emerging technologies like artificial intelligence (AI). Insurers are beginning to ask more detailed questions about how AI is being used within organizations and how it’s being incorporated into detection and response capabilities.

 

Moreover, cyber insurance policies are increasingly being tailored to the specific needs of organizations. This includes offering proactive tools that can help organizations prepare for and respond to ransomware attacks. For example, some policies now include coverage for tabletop exercises, incident response planning, and access to breach coaches and specialized vendors.

The importance of a holistic approach to cybersecurity

I want to emphasize that cyber insurance should be viewed as one component of a broader, defense-in-depth strategy. Relying solely on insurance to mitigate the impact of a ransomware attack is not sufficient. Instead, organizations must adopt a holistic approach to cybersecurity that includes strong preventive measures, regular testing, and a clear understanding of their risk landscape.

 

The importance of communication and collaboration across the organization cannot be overstated. Cybersecurity is not just the responsibility of the IT department; it requires buy-in from the board of directors, management, and all employees. By fostering a culture of security awareness and ensuring that everyone understands their role in protecting the organization, companies can better defend against ransomware attacks.

Conclusion: The future of cyber insurance and ransomware mitigation

Ransomware remains a significant threat, but organizations can take proactive steps to protect themselves. By aligning cybersecurity practices with established frameworks, continuously testing and improving defenses, and incorporating cyber insurance into risk management strategies, organizations can better withstand the challenges posed by ransomware.

As the cyber insurance market continues to evolve, it’s crucial for organizations to stay informed about the latest developments and adjust their strategies accordingly. The ultimate goal is to create a resilient organization that can not only survive a ransomware attack but continue to thrive in the face of ever-changing cyberthreats.

On-demand cyber insurance webinar

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

ESET Research: Spy group exploits WPS Office zero day; analysis uncovers a second vulnerability

  • South Korea-aligned advanced persistent threat group APT-C-60 weaponized a remote code execution vulnerability in WPS Office for Windows (CVE-2024-7262) in order to target East Asian countries. ESET Research discovered the vulnerability and provides a root cause analysis, along with a description of its weaponization.
  • A strange spreadsheet document referencing one of the group’s many downloader components pointed to APT-C-60.
  • The exploit is deceptive enough to trick users into clicking on a legitimate-looking spreadsheet while also being very effective and reliable. The choice of the MHTML file format allowed the attackers to turn a code execution vulnerability into a remote one.
  • While analyzing the vulnerability, ESET Research discovered another way to exploit it (CVE-2024-7263).
  • Following our coordinated vulnerability disclosure policy, as Kingsoft acknowledged and patched both vulnerabilities, we provide a detailed analysis.

BRATISLAVA, MONTREALAugust 28, 2024 — ESET researchers discovered a remote code execution vulnerability in WPS Office for Windows (CVE-2024-7262). It was being exploited by APT-C-60, a South Korea-aligned cyberespionage group, to target East Asian countries. When examining the root cause, ESET discovered another way to exploit the faulty code (CVE-2924-7263). Following a coordinated disclosure process, both vulnerabilities are now patched. The final payload in the APT-C-60 attack is a custom backdoor with cyberespionage capabilities that ESET Research internally named SpyGlace.

“While investigating APT-C-60 activities, we found a strange spreadsheet document referencing one of the group’s many downloader components. The WPS Office software has over 500 million active users worldwide, which makes it a good target to reach a substantial number of individuals, particularly in the East Asia region,” says ESET researcher Romain Dumont, who analyzed the vulnerabilities. During the coordinated vulnerability disclosure process between ESET and the vendor, DBAPPSecurity independently published an analysis of the weaponized vulnerability and confirmed that APT-C-60 has exploited the vulnerability to deliver malware to users in China.

The malicious document comes as an MHTML export of the commonly used XLS spreadsheet format. However, it contains a specially crafted and hidden hyperlink designed to trigger the execution of an arbitrary library if clicked when using the WPS Spreadsheet application. The rather unconventional MHTML file format allows a file to be downloaded as soon as the document is opened; therefore, leveraging this technique while exploiting the vulnerability provides for remote code execution.

“To exploit this vulnerability, an attacker would need to store a malicious library somewhere accessible by the targeted computer either on the system or on a remote share, and know its file path in advance. The exploit developers targeting this vulnerability knew a couple of tricks that helped them achieve this,” explains Dumont. “When opening the spreadsheet document with the WPS Spreadsheet application, the remote library is automatically downloaded and stored on disk,” he adds.

Since this is a one-click vulnerability, the exploit developers embedded a picture of the spreadsheet’s rows and columns inside to deceive and convince the user that the document is a regular spreadsheet. The malicious hyperlink was linked to the image so that clicking on a cell in the picture would trigger the exploit.

“Whether the group developed or bought the exploit for CVE-2024-7262, it definitely required some research into the internals of the application but also knowledge of how the Windows loading process behaves,” concludes Dumont.

After analyzing Kingsoft’s silently released patch, Dumont noticed that it had not properly corrected the flaw and discovered another way to exploit it due to an improper input validation. ESET Research reported both vulnerabilities to Kingsoft, who acknowledged and patched them. Two high severity CVE entries were created: CVE-2024-7262 and CVE-2024-7263.

The discovery underlines the importance of a careful patch verification process and making sure that the core issue has been addressed in full. ESET strongly advises WPS Office for Windows users to update their software to the latest release.

For more technical information about the WPS Office vulnerabilities and exploits, check out the blog post “Analysis of two arbitrary code execution vulnerabilities affecting WPS Office” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X) for the latest news from ESET Research.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Guardz Launches ‘Community Shield’ – Free Plan to Strengthen MSP Cybersecurity Posture



  • Guardz introduces the Community Shield Plan, a free, comprehensive cybersecurity platform tailored for MSPs to protect their internal operations.
  • The plan offers MSPs unified detection and response capabilities across identities, emails, devices, and data, enabling them to safeguard their own operations without financial strain.
  • This initiative aims to bolster MSPs’ security, reflecting Guardz’s appreciation and continued support for the MSP community. 




MSPs operate at the intersection of technology and trust. Tasked with managing diverse customer environments, they navigate a complex web of point solutions, each with its own set of challenges and vulnerabilities. This responsibility places a significant burden on MSPs, who must ensure not only the security of their clients but also their own operations. With access to vast amounts of sensitive information, MSPs have become prime targets for cybercriminals, and the rise in supply chain and cloud attacks only adds to the pressure.

Today, the digital landscape is more dangerous than ever. Cyber threats are evolving, and MSPs find themselves in the crosshairs. The need to bolster internal security is not just a priority; it’s a necessity.  The challenge is clear: how can MSPs effectively safeguard their operations without stretching their resources too thin?

We are thrilled to announce the launch of the Guardz Community Shield Plan, which aims to empower MSPs to secure and insure their internal operations easily. The Community Shield plan offers a unified platform that provides unified detection and response capabilities across identities, emails, devices, and data—all at no cost.

This innovative plan allows MSPs to establish a strong security foundation without the burden of financial commitment. With access to the full suite of the Guardz advanced security controls, MSPs can now focus on what they do best—protecting their clients—while resting assured that their operations are equally safeguarded. For those looking to extend this high level of protection to their clients, the Community Shield plan seamlessly integrates with the Guardz cost-effective solutions.

“This offering is our commitment to supporting and protecting the MSP community, reflecting our appreciation for the partnership and trust we are building together,” said Dor Eisner, CEO and Co-Founder of Guardz. “We’ve gained so much from this collaborative community, and now we want to give back. By providing the Guardz platform for free, we aim to support MSPs’ growth and success while keeping their businesses secure. We believe that a secure MSP is better equipped to foster secure environments for their clients, creating a ripple effect of enhanced cybersecurity across the board and, ultimately, a safer digital world.”

The Guardz Community Shield plan is available immediately. Interested MSPs can sign up for a free two-week trial and claim their free licenses directly from the product.  To learn more and sign up, click here.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.