Skip to content

ESET is a Customers’ Choice for Endpoint Protection according to Gartner® Peer Insights™

ESET enhances its European footprint with new ESET Nordics offices

  • ESET Nordics, based in Copenhagen, Denmark, along with a satellite office in Göteborg, Sweden, join the ranks of ESET’s global commercial offices.
  • The new office will support entities based in Denmark, Sweden, Norway, Finland and Iceland.
  • ESET Nordics will continue to deliver outstanding cybersecurity solutions and provide local support for both channel partners and end customers.

BRATISLAVA, COPENHAGEN (DK)January 5, 2026 — ESET, a global leader in cybersecurity solutions, today announced the opening of its ESET Nordics branch in Copenhagen, Denmark, along with a satellite office in Göteborg, Sweden, both working together to bring ESET closer to its customers and partners in Northern Europe starting on January 1st, 2026.

As the world rapidly changes, driven by disruptive technologies and an increasingly complex geopolitical landscape, Europe’s need to guarantee its digital sovereignty has become essential to securing the region’s digital ecosystem. EU-based solutions, such as ESET, provide citizens, businesses, and governments with confidence that their data and, more importantly, their critical infrastructure are protected. This is increasingly vital amid growing cybercrime and state-aligned activity, marked by high-profile hacking attempts against hospitals, manufacturers, financial entities and other critical industries across the EU.

Thus, establishing ESET Nordics and its satellite office in Sweden is both part of the company’s long-term strategy to boost market growth in Europe’s top IT security markets, but also an answer to the woes of customers and companies based in the Nordics, asking for a partner that could help them when the pressure is already mounting — rapidly, with local intelligence, and in their own language.

“The world’s changing. If a global cybersecurity company wants to properly reflect regional rules, regulations and overall, the populace’s needs, it must establish a local presence,” commented Pavol Holéczy, Vice President of EMEA Sales at ESET, “We’re proud of being recognized for our local commitments, and we will continue on delivering our portfolio of products and services in line with what our existing and prospective partners in the Nordics require,” Mr. Holéczy added.

This strategic expansion strengthens our presence across Denmark, Sweden, Norway, Finland, and Iceland, helping ESET bridge the gap between its global offer and distinct regional needs.

“Showing up locally isn’t just good manners, it’s good business. Real relationships are built through proximity. Local presence means we speak the language, feel the rhythm, and earn trust the way only neighbors can,” said Leif Jensen, Country Manager for ESET Nordics.

The efficacy of this strategy is clearly displayed by the assessments of independent analysts like Forrester, ECSO, and KuppingerCole, commending ESET for its local presence and support that empowers its products and services like ESET MDR wherever they’re needed.

Founded in 1992, European Union-based ESET has been a dominant player in the endpoint security market. Since then, ESET has been gaining ground and growing its enterprise portfolio with specialized products and divisions like ESET Corporate Solutions, protecting some of the largest companies in the world. ESET security solutions are currently sold in over 178 markets protecting more than one billion people across the globe.

ESET is dedicated to supporting European excellence. See how we committed €3 million to Horizon Europe AI project empowering minority languages, or our support of intergovernmental and nongovernmental organizations like Europol and the Netherlands Industry for Defense and Security Foundation (NIDV)

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

The Voice of the Customer has spoken: ESET is a Customers’ Choice for Endpoint Protection according to Gartner® Peer Insights™

BRATISLAVA — January 27, 2026 —ESET, a global leader in cybersecurity, is proud to announce that it has been recognized as a Customers’ Choice in the 2026 Gartner® Peer Insights™ Voice of the Customer report1 for Endpoint Protection Platforms. Out of 18 evaluated vendors, ESET is among only five to earn this distinction, based on its strong performance in both User Interest and Adoption (xaxis) and Overall Experience (yaxis).

According to the report, 99% of Gartner Peer Insights reviews received for ESET indicated either a 5-star (78%) or 4-star (21%) rating. Overall, our customers have given us a rating of 4.8 out of 5, with 96% stating they would recommend our product. ESET’s Support Experience received particularly high praise, earning 4.8 out of 5, with customers also commending the company’s Product Capabilities, Sales Experience, and Deployment Experience

“Being recognized as a Customers’ Choice by Gartner Peer Insights is highly important to us because it comes directly from organizations and IT professionals who rely on our technologies every day,” said Zuzana Legáthová, Director of Market Intelligence and Analyst Relations at ESET. “Our customers’ trust is at the core of everything we do. Their feedback validates our commitment to delivering a PreventionFirst, AIdriven cybersecurity platform that not only strengthens security posture but also drives measurable business impact, helping organizations operate with confidence and resilience in an increasingly complex threat landscape.”

The “Voice of the Customer” report aggregates peer reviews and ratings over an 18-month period ending 30 November 2025, offering valuable insights into customer experiences with leading cybersecurity vendors. ESET´s recognition is based on reviews from 134 verified end-user professionals, and we believe it reflects their direct experience operating the ESET PROTECT Platform.

ESET PROTECT is a comprehensive cybersecurity platform designed to meet the evolving needs of modern organizations. It´s our cloud-first XDR cybersecurity solution that combines AI-native next-gen prevention, detection, and proactive threat hunting to keep businesses secure. Built on decades of expertise and continuous innovation, it delivers a Prevention-First approach to security, integrating advanced technologies and security services into a single, scalable solution.

Discover more about ESET PROTECT Platform. For more information about ESET’s awards and recognized excellence, click here.

GARTNER is a registered trademark and service mark of Gartner, Inc., and/or its affiliates in the U.S. and internationally, and PEER INSIGHTS is a registered trademark of Gartner, Inc., and/or its affiliates and are used herein with permission. All rights reserved. Gartner® Peer Insights™ content consists of the opinions of individual end users based on their own experiences and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product, or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose. 

1Gartner, Voice of the Customer for Endpoint Protection Platforms, By Peer Contributors, January 2026 

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Fake dating app used as lure in spyware campaign targeting Pakistan, ESET Research discovers

  • ESET researchers have uncovered an Android spyware campaign that uses romance scam tactics to target individuals in Pakistan.
  • The campaign leverages the GhostChat spyware, which enables covert surveillance on the device, allowing the threat actor to monitor activity and exfiltrate sensitive data.
  • The ESET investigation revealed further activities conducted by the same threat actor: an attack involving ClickFix, which tricks users into executing malicious code on their computers, and a WhatsApp attack that exploits the app’s link-to-device feature to access its victims’ personal messages.

BRATISLAVAJanuary 28, 2026 — ESET researchers have uncovered an Android spyware campaign leveraging romance scam tactics to target individuals in Pakistan. The campaign uses a malicious app posing as a chat platform that allows users to initiate conversations operated via WhatsApp. Underneath the romance charade, the real purpose of the malicious app, which ESET named GhostChat, is exfiltration of the victim’s data. The same threat actor appears to be running a broader spy operation – including a ClickFix attack leading to the compromise of victims’ computers, and a WhatsApp device-linking attack gaining access to victims’ WhatsApp accounts – thus expanding the scope of surveillance. These related attacks used websites impersonating Pakistani governmental organizations as lures. Victims obtained GhostChat from unknown sources, and it requires manual installation; it was never available on Google Play, and Google Play Protect, which is enabled by default, protects against it.

“This campaign employs a method of deception that we have not previously seen in similar schemes – fake female profiles in GhostChat are presented to potential victims as locked, with passcodes required to access them. However, as the codes are hardcoded in the app, this is just a social engineering tactic likely aimed to create the impression of exclusive access for the potential victims,” says ESET researcher Lukáš Štefanko, who discovered the campaign. “Our investigation reveals a highly targeted and multifaceted espionage campaign aimed at users in Pakistan,” he adds.

The app uses the icon of a legitimate dating app but lacks the original app’s functionality and instead serves as a lure – and tool – for espionage on mobile devices. Once logged in, victims are presented with a selection of 14 female profiles; each profile is linked to a specific WhatsApp number with a Pakistani (+92) country code. The use of local numbers reinforces the illusion that the profiles are real individuals based in Pakistan, increasing the credibility of the scam. Upon entering the correct code, the app redirects the user to WhatsApp to initiate a conversation with the assigned number – presumably operated by the threat actor.

While the victim engages with the app, and even prior to logging in, GhostChat spyware has already begun running in the background, silently monitoring device activity and exfiltrating sensitive data to a C&C server. Beyond initial exfiltration, GhostChat engages in active espionage: It sets up a content observer to monitor newly created images and uploads them as they appear. Additionally, it schedules a periodic task that scans for new documents every five minutes, ensuring continual surveillance and data harvesting.

The campaign is also connected to broader infrastructure involving ClickFix-based malware delivery and WhatsApp account hijacking techniques. These operations leverage fake websites, impersonation of national authorities, and deceptive, QR-code-based device-linking to compromise both desktop and mobile platforms. ClickFix is a social engineering technique that tricks users into manually executing malicious code on their devices by following seemingly legitimate instructions.

In addition to desktop targeting via the ClickFix attack, a malicious domain was used in a mobile-focused operation aimed at WhatsApp users. Victims were lured into joining a supposed community – posing as a channel of the Pakistan Ministry of Defence – by scanning a QR code to link their Android device or iPhone to WhatsApp Web or Desktop. Known as GhostPairing, this technique allows an adversary to gain access to the victims’ chat history and contacts, acquiring the same level of visibility and control over the account as the owners, effectively compromising their private communications.

For a more detailed analysis of GhostChat, check out the latest ESET Research blog post, “Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan”  on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X), BlueSky, and Mastodon for the latest news from ESET Research..

GhostChat attack flow

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Scalefusion Achieves Zebra Validation for Unified Device Management

Kubernetes Logging Best Practices | Operational Excellence

2025-12-22   A log correlation engine automates the process of linking fragmented event data across diverse systems, transforming raw logs into real-time, actionable insights. By normalizing data and applying correlation rules, it reduces alert fatigue, accelerates incident detection (MTTD), and enables faster root cause analysis for improved security and operational efficiency.

Continue reading

8 Essential Cloud Security Tools for SaaS & Cloud Environments

Executive Summary: Modern cloud security has moved beyond the perimeter. Success now depends on a layered strategy focusing on Identity, Visibility, and Continuous Monitoring across SaaS and multi-cloud infrastructures.

The Growing Cloud Risk Landscape

As organizations migrate sensitive data to the cloud, the attack surface has expanded far beyond traditional boundaries. Recent research highlights a stark reality:

83%
of companies experienced a serious cloud security incident in 2024.
88%
of cloud breaches involve human error or misconfigurations.

8 Core Cloud Security Tool Types

  • 1. IAM (Identity & Access Management): The new perimeter. Defines who can access what under specific conditions using MFA and Role-Based Access Control (RBAC).
  • 2. CASB (Cloud Access Security Broker): Acts as a policy enforcement bridge between users and SaaS providers, essential for managing “Shadow IT.”
  • 3. SASE/SSE: Converges networking and security into a single cloud-delivered model, securing remote traffic and DNS.
  • 4. Enterprise Browser: Secures work at the interaction level, isolating business data from personal web browsing.
  • 5. DLP (Data Loss Prevention): Protects sensitive intellectual property by monitoring data in motion and at rest across all platforms.
  • 6. CSPM (Cloud Security Posture Management): Proactively identifies misconfigured storage buckets and compliance gaps in cloud infrastructure.
  • 7. CIEM (Cloud Infrastructure Entitlement Management): Manages “permission sprawl” to ensure users only have the access they strictly require.
  • 8. CWPP (Cloud Workload Protection Platform): Focuses on runtime security for active workloads like containers, Kubernetes, and serverless functions.

Strategy for Implementation

Choosing the right tools requires an alignment with your operational reality. Key considerations include:

  • Visibility: Can the tool see across all multi-cloud and SaaS instances?
  • Scalability: Does the solution grow with your data volume without increasing noise?
  • User Experience: Does the security layer impede productivity or provide seamless access?

How NordLayer Empowers Cloud Security

NordLayer facilitates a Zero Trust approach to cloud access. By focusing on identity-first security, NordLayer provides encrypted traffic, DNS filtering, and centralized policy enforcement that integrates seamlessly into SASE architectures.

Data referenced includes industry studies from 2023–2024 regarding global average breach costs (~$4.4M) and cloud configuration risks.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

The 6-Minute Rule: Why Detection Speed is the New Standard for Cyber Survival

We are pleased to invite you to an exclusive webinar:

The 6-Minute Rule: Why Detection Speed is the New Standard for Cyber Survival 

In today’s threat landscape, a breach detected in days is a business lost. Join us to discover how ESET’s new AI-powered MDR achieves an industry-leading 6-minute response time, neutralizing threats before they can paralyze your operations. 

Learn how to bridge your internal security expertise gap with 24/7 world-class threat hunters and move from reactive fear to proactive protection.

🗓 Date: 4 February 2026, Wednesday
🕒 Time: 3pm – 4pm SGT
💻 Venue: Gotowebinar
🌐 Language: English
👨🏻‍💻 Speaker: Kenneth Lo

Hotline (65) 6296 4268 | Email: sales@version-2.com.sg
Website: www.version-2.com.sg | www.v2catalog.com

CVE-2026-20045: Cisco Unified Communications Manager Vulnerability Guide

Severity: Critical (CVSS 8.2)
Impact: Remote Code Execution (RCE) via arbitrary command injection.
 

Vulnerability Overview

Cisco has officially reported a high-risk vulnerability affecting a wide array of telecommunications and voice management products. This flaw enables an unauthenticated remote attacker to gain administrative control by executing system-level commands on vulnerable hosts.

Affected Products:

  • Cisco Unified Communications Manager (CUCM)
  • CUCM Session Management Edition
  • CUCM IM & Presence Service
  • Cisco Unity Connection
  • Cisco Dedicated Webex Calling Instances

Impact and Scope

Confirmed Vulnerable Versions: 12.5, 14.x, and 15.x.
Note: Legacy versions are also considered potentially vulnerable and should be evaluated immediately.

If successfully exploited, an adversary can execute commands with the privileges of the underlying operating system, potentially leading to unauthorized data access, service disruption, or full network pivot.

Remediation and Patches

Cisco has confirmed that no workarounds are currently available. Security teams must take the following actions:

  • For Version 12.5 and older: Upgrade immediately to a supported, fixed release.
  • For Versions 14.x and 15.x: Apply the specific security patches detailed in the vendor’s official advisory.

Locating Vulnerable Assets with runZero

To identify potentially exposed systems within your environment, navigate to the Software inventory and execute the following search query:

vendor:=Cisco AND product:="Unified Communications Manager"[Insert Query Here]

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

EPM Strategy: Stopping Privilege-Based Attacks

Key Insights

  • Privilege misuse, not technical exploits, drives the majority of endpoint breaches.
  • Identity is the new perimeter; endpoint privileges are the “crown jewels” for lateral movement.
  • EPM provides granular control over how and when privileges are used at runtime.

The 6 Primary Privilege Attack Vectors

Adversaries depend on excessive permissions and administrative blind spots to advance their objectives. Common techniques include:

Local Privilege Escalation
Exploiting vulnerabilities to move from standard user status to full administrator access.
Credential Theft
Extracting credentials from memory (e.g., Mimikatz) to impersonate users across systems.
Living-Off-the-Land (LotL)
Abusing trusted system tools like PowerShell and WMI to perform malicious actions undetected.
Abuse of Local Admin Rights
Inheriting unrestricted control over security settings and sensitive data via compromised admin accounts.
Fileless & Script Attacks
Executing malicious code directly in memory with elevated rights to evade disk-based forensics.
Application Misuse
Leveraging trusted application contexts to bypass security controls with modified binaries.

Mitigation Powered by Segura® EPM

Segura® EPM aligns with Zero Trust principles to ensure every privileged action is validated and monitored.

Mitigation VectorSegura® EPM CapabilityOutcome
Local Admin RightsEliminates permanent admin status; converts access to monitored elevation requests.Drastic reduction in the attack surface for ransomware.
JIT ElevationGrants temporary privileges for specific tasks that automatically expire.Neutralizes sustained privilege availability for attackers.
Application ControlDynamic allowlisting prevents unauthorized scripts and binaries from running with rights.Stops LotL techniques and DLL sideloading.
SOC VisibilityReal-time telemetry on elevation attempts and anomalous patterns sent to SIEM/XDR.Converts privilege misuse into a high-fidelity detection signal.

Securing the Machine Identity

Often overlooked, service accounts and machine identities are common vectors for persistence. Segura® applies least privilege to daemons and automation tools, preventing machine tokens from being leveraged for lateral movement.

Conclusion

In a hybrid, SaaS-dominated environment, traditional EPP and antivirus are insufficient. Segura® Endpoint Privilege Management serves as a critical defensive layer by transforming privilege from a vulnerability into a controlled, auditable, and resilient security asset.

Explore Segura® EPM

Reduce local admin risk and support Zero Trust without disrupting operations.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.