Skip to content

Fintech Security Team slashes Threat Remediation Time with NordStellar

The Challenge

As the fintech scaled, growing dark web exposure created a critical blind spot. With limited visibility beyond internal assets, the team couldn’t detect leaked credentials or brand-targeting phishing threats—until a third-party breach exposed employee data on the dark web, triggering real business risk.

“NordStellar gave us the visibility we needed into leaked credentials and external threats. It’s become a key part of how we monitor our digital attack surface.”

VP of Security Operations

NordStellar’s Solution

After evaluating multiple vendors, including a POC with another threat intelligence provider, the company chose NordStellar based on:

  • Access to one of the largest dark and deep web data pools

  • High-quality alerts without the noise

  • Real-time coverage across deep and dark web sources

  • Usable, analyst-friendly interface

NordStellar also stood out for its ability to match leaked data from deep and dark web sources with employee credentials, delivering actionable insights rather than raw alerts. During the evaluation, the platform detected 2x more relevant exposures than the competing solution — accelerating investigation and response. Moreover, it delivered immediate visibility into active threats through:

  • Leaked data management and dark web monitoring

  • Automated alerts on credential leaks and brand abuse

  • Domain squatting and affiliate fraud detection

  • Real-time insights with actionable context

Find out what threat actors alreay know about

your business - before it costs you.

Hotline (65) 6296 4268 | Email: sales@version-2.com.sg
Website: www.version-2.com.sg | www.v2catalog.com

ESET PROTECT MDR – Cybersecurity with 24/7 Service

ESET MDR is now available

Do you want the cyber security that large enterprises enjoy – but without the expense and complexity of maintaining an in-house, fully-staffed SOC? ESET’s Managed Detection and Response (ESET MDR) service brings threat management right to your doorstep, regardless of the size of your organization or your current cybersecurity posture.

Get world-class threat detection and response that delivers:

IMMEDIATE
RESPONSE

from ESET cyber security experts

ALWAYS ON

thanks to ESET’s 24/7/365 guarantee

COMPLIANCE-READY

protection that meets your insurance needs

The fastest MDR service to detect and stop cyber attacks

Time to discover and respond to a threat

Source: Verizon 2025 Data Breach Investigations Report and public websites of sample MDR providers as of July 2025. Mean Time to Respond (MTTR) is the average time between the initial detection of a security incident and the first action taken to address it.

ESET PROTECT MDR

Find out how you'll benefit, review the benefits of ESET MDR

Hotline (65) 6296 4268 | Email: sales@version-2.com.sg
Website: www.version-2.com.sg | www.v2catalog.com

Portnox Named 2025 Austin Inno Fire Awards Finalist

Portnox, a leading provider of universal passwordless Zero Trust solutions, has officially been named a finalist in the 2025 Austin Inno Fire Awards. This accolade highlights Portnox’s role as a primary driver of innovation and economic growth within the vibrant Central Texas technology sector.
“Austin has become a premier global hub for cybersecurity, and we are proud to contribute to that legacy,” said Denny LeCompte, CEO of Portnox. “This recognition validates our team’s dedication to delivering practical, cloud-native security that simplifies Zero Trust for the modern enterprise.”
 

A Year of Strategic Momentum

Portnox’s inclusion in the Fire Awards follows a period of rapid expansion and technical breakthroughs in 2025:

$37.5M Series B Funding
Capital raised to accelerate go-to-market strategies and drive continuous product innovation.
ZTNA Solution Launch
Released a cloud-native Zero Trust Network Access (ZTNA) solution for remote and local access.
Security Integrations
Expanded real-time risk control through partnerships with CrowdStrike, SentinelOne, and Jamf.
Market Leadership
Serving 1,000+ global organizations with a 4.6-star rating on Gartner Peer Insights.
 

Simplifying Enterprise Security

By unifying passwordless authentication, continuous risk monitoring, and compliance enforcement into a single cloud-delivered platform, Portnox eliminates the complexity typically associated with Zero Trust architectures. The company maintains a 95% customer retention rate, underscoring its commitment to customer success and operational excellence.

Presented by the Austin Business Journal and Austin Inno, the Fire Awards celebrate companies shaping the region’s innovation ecosystem through measurable impact and business growth.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ClawdBot Security Deep-Dive

The viral adoption of the open-source AI assistant ClawdBot (now Moltbot) has highlighted a critical vulnerability in local-first AI agents: unrestricted system access paired with insecure defaults.

Security Alert: Active infostealer campaigns are currently targeting ClawdBot configuration directories to harvest plaintext API keys and session tokens.

Technical Vulnerabilities

ClawdBot’s primary failure stems from its Gateway API (Port 18789), which allows unauthenticated RCE if bound to public interfaces.

ServiceDefault PortRisk
Gateway API18789CRITICAL (RCE)
Browser Automation18791CRITICAL
Web Dashboard3000HIGH

Hardening Checklist

  • Network: Bind Gateway API strictly to localhost (127.0.0.1).
  • Auth: Configure a strong token (minimum 32 characters).
  • Privilege: Disable shell capability (exec) unless absolutely necessary.
  • Monitoring: Deploy custom EDR rules (SentinelOne STAR) to monitor for zsh sub-processes spawned by the agent.
  • Permissions: Set config directories to chmod 700.

Strategic Summary

AI agents must be treated as privileged access pathways. Organizations should apply strict data classification policies and zero-trust boundaries to any agentic AI deployment to prevent them from becoming the ultimate Shadow IT liability.

 

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

10 Critical MSP Trends and Predictions for 2026

“MSPs who win in 2026 will use AI as scaffolding, not a shortcut. Content is easy to spin up, but authentic personality is the real competitive edge.”

Paul Green (MSP Marketing Edge) argues that clients don’t buy based on technical specs—they buy based on trust. In 2026, MSPs must replace stock photos with real faces and AI-written articles with genuine client stories.

2. The Identity-First Security Landscape

Elli Shlomo (Guardz) highlights that for the modern SMB, identity is the only real perimeter. As users work from anywhere and rely on SaaS, a single token theft can bypass traditional network security. MSPs must shift focus to login flows and MFA configuration.

3. “Unreasonable Hospitality” in Support

Justin Esgar (Virtua Consulting) predicts that technical excellence is no longer enough. The winners of 2026 will practice “unreasonable hospitality”—knowing a client’s stress points, caring about their team’s milestones, and obsessing over the human experience rather than just the ticket queue.

4. Cyber Insurance and Vendor Hygiene

Chris Johnson (GTIA) notes that cyber insurance claims have skyrocketed. In 2026, MSPs must be more rigorous with their own supply chain. Vendors without ISO 27001 or SOC 2 certifications will be phased out as liability risks become too high to ignore.

5. From MSP-Centric to Customer-Centric

Luis Giraldo (ScalePad) expects a pivot away from “rigid stacks.” Successful MSPs will stop forcing every client into the same box and instead offer flexible solutions mapped directly to unique business outcomes and risk appetites.

6. The Rise of “Industrialized” Cybercrime

Cybercrime is no longer about lone hackers; it’s a professionalized service industry. SMBs are being targeted by automated phishing kits and Ransomware-as-a-Service (RaaS). This shift demands continuous monitoring over simple endpoint protection.

7. Outcomes Over Tooling

Dave Meister (Check Point) warns that the competition is no longer just other MSPs—it’s VARs and telcos trying to bundle “managed” services. Differentiation will come from owning the outcome (e.g., “Zero downtime”) rather than just selling a list of 40 add-on tools.

8. The Decline of AI Code Quality

Matt Lee (Pax8) remains cautious about AI-assisted coding. He warns that as AI-generated code quality potentially declines, security implications will rise, creating “old problems with new vendors.”

9. High-Frequency Content Distribution

Taher Hamid (MSP Camp) believes content is the new currency. To stay on a buyer’s radar, MSPs must become the local “voice of technology” through consistent, insightful content creation across video, social, and email.

10. A New Operating Model

Damien Stevens (Servosity) challenges MSPs to change their mindset. AI isn’t just a new tool; it’s a new operating model. MSPs need to stop hiding in the “IT comfort zone” and start engaging with marketing, sales, and finance leaders to solve business problems.

Navigate 2026 with Guardz

The Guardz unified platform maps all threats to user behavior, providing AI-powered detection and 24/7 MDR. Secure your clients from the inbox to the endpoint and demonstrate real value in 2026.

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

GREYCORTEX Mendel 4.6 Now Available

Streamlined Network Analysis: Mendel 4.6 introduces enriched network context and faster investigation tools, allowing security analysts to work more efficiently with complex data.

The 4.6 update focuses on optimizing how analysts validate security findings and interact with network telemetry. By providing a deeper level of visibility, the platform ensures that response teams can identify and address threats with higher precision.

New Features & System Improvements:

  • Hostname & Guest Identity Tracking: Enhanced history logs for hostnames and guest identity monitoring.
  • Application Layer Visibility: Deeper insights into device behavior and asset status using application layer data.
  • Unified PCAP Workflow: A centralized environment for the capture and playback of PCAP records.
  • Modern Authentication Support: Expanded identity management featuring SAML and Single Sign-On (SSO).
  • Napatech Bypass Mode: Implementation of a bypass mode that maintains consistent network flows for Napatech integrations.
  • Enhanced Zabbix Integration: Updated asset information exchange for better synchronization.
  • OpenAppID Framework Update: Refresh of the OpenAppID framework to the latest version.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Product release: Improve your compliance posture with CloudM Archive 2.7

Product Update

CloudM Archive 2.7 Release

Introducing Google Chat Archiving and Progressive Search Enhancements

We are excited to announce the release of CloudM Archive 2.7. This update is designed to help organizations better manage their digital footprints, ensure legal compliance, and reduce storage costs across the Google Workspace ecosystem.

The Headline: Google Chat Archiving

As remote and hybrid work continues to dominate, the volume of data generated in Google Chat has skyrocketed. Version 2.7 now allows administrators to seamlessly archive Google Chat messages, including 1-to-1 conversations, group chats, and Spaces.

  • Retention Compliance: Meet legal requirements by storing chat history outside of the active production environment.
  • Metadata Preservation: Archive messages along with timestamps, sender details, and attachments.
  • Cost Efficiency: Move aging chat data to low-cost storage without losing searchability.

What’s New in Archive 2.7?

🚀 Progressive Search

We've optimized our search engine to be faster and more intuitive. Find specific archived items across Drive, Gmail, and now Chat with improved filtering and reduced latency.

🛡️ Enhanced Security

Improved auditing logs and granular permissions ensure that only authorized personnel can view or restore sensitive archived chat data.

📊 Refined UI

A refreshed dashboard view provides a clearer overview of your storage savings and archive health at a glance.

🔗 Improved API Access

Developers can now leverage updated API endpoints to integrate CloudM Archive data with third-party eDiscovery or analytics tools more effectively.

Why Use CloudM Archive?

CloudM Archive remains the leading solution for businesses looking to optimize their Google Workspace tenant. By moving data to your own cloud storage (GCP, Azure, or AWS), you maintain total ownership and control over your data while significantly reducing the "license bloat" associated with keeping ex-employees' data active just for retention purposes.

Seamless Migration Integration

As always, CloudM Archive works hand-in-hand with CloudM Migrate. When offboarding an employee, you can automatically trigger an archive process that clears their active license while preserving every file and chat for future reference.

About CloudM
CloudM is an award-winning SaaS company whose humble beginnings in Manchester have grown into a global business in just a few short years.

Our team of tech-driven innovators have designed a SaaS data management platform for you to get the most from your digital workspace. Whether it’s Microsoft 365, Google Workspace or other SaaS applications, CloudM drives your business through a simple, easy-to-use interface, helping you to work smarter, not harder.

By automating time-consuming tasks like IT admin, onboarding & offboarding, archiving and migrations, the CloudM platform takes care of the day-to-day, allowing you to focus on the big picture.

With over 35,000 customers including the likes of Spotify, Netflix and Uber, our all-in-one platform is putting office life on auto-pilot, saving you time, stress and money.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Pandora ITSM – Release OUM #108

This update focuses on administrative centralization, task-level flexibility, and modern security standards.

Strategic New Features & Improvements

1. Centralized Global Inventory Management

We have overhauled the management of global inventory fields. These fields are now handled in a new, unified section, removing the previous redundancy where fields were duplicated across every individual Object Type.

Major Benefits:
  • Ensures superior configuration consistency.
  • Reduces manual errors by eliminating field duplication.
  • Enables more agile and efficient data management.

2. Advanced Customization for Project Tasks

To provide greater flexibility, we have introduced new "Task Types" for project management. This allows teams to define specific custom fields tailored to their unique requirements.

  • Assign a specific Task Type to each project task.
  • Dynamically configure available fields based on the selected type.
  • Capture comprehensive information specific to the project's context.

3. OAuth 2.0 Integration for Microsoft O365

Following Microsoft's updated security policies, legacy connection methods for email are no longer viable. This version integrates OAuth 2.0, providing a secure authentication path for sending and receiving emails through Microsoft servers.

Functional Enhancements & UI Updates

Security & Compliance
  • Mandatory 2FA configuration can now be enforced for all users globally.
  • Applied strict ACL restrictions to user mentions across all modules (Incidents, Projects, Changes).
  • Added expiration dates to session cookies for improved security posture.
Reporting & Visuals
  • Redesigned performance reports now include a column for "non-billable hours".
  • Modernized the Web Console sidebar with redesigned and relocated minimize/maximize controls.
  • Improved the "Operator Detailed" report with a cleaner, intuitive interface.

Vulnerability Remediation

Reference Description Status
Case #3399 Restricted involuntary access to menu items explicitly marked as hidden while maintaining authorized group/user access. Fixed

Summary of Notable Bug Fixes

  • Authentication: Resolved issues with user creation and login via LDAP® and Microsoft AD®.
  • Data Integrity: Blocked the ability to post duplicate comments within Work Units.
  • Reporting: Corrected percentage calculations in general support charts and fixed date filtering in detailed reports.
  • Performance: Implemented database indexing for project tasks to significantly reduce access times.

Note: New installations of PITSM now feature optimized default incident fields and rename "SLA affected" to "SLA triggered" for better clarity.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Graylog Helm Chart Beta V.1.0.0 Announcement

2025-12-22   A log correlation engine automates the process of linking fragmented event data across diverse systems, transforming raw logs into real-time, actionable insights. By normalizing data and applying correlation rules, it reduces alert fatigue, accelerates incident detection (MTTD), and enables faster root cause analysis for improved security and operational efficiency.

Continue reading

How to Avoid Telegram Scams: Security Guide

Telegram has evolved into a leading messaging platform in the U.S., but its open structure and bot-friendly design also make it a primary target for cybercriminals. Scammers frequently use social engineering to trick mobile users into costly financial mistakes.

Common Telegram Scams to Watch For

1. Crypto and Investment Fraud

This is the most financially damaging category. Scammers use professional-looking channels and automated bots to promote “private” investment groups or fake giveaways. They often use staged profit screenshots to create a false sense of credibility. Once payment is sent to their wallet address, support disappears and withdrawals are blocked.

2. Phishing and Account Takeover

Attackers send unsolicited messages claiming your account is “flagged” for suspicious activity. They trick you into sharing a one-time login code, which grants them immediate control over your account. They then impersonate you to scam your contacts.

Important: Telegram will never ask for your login code through a direct message.

3. Impersonation Scams

Scammers clone profile photos and names to impersonate friends, family, or managers. They monitor group chats to find the perfect moment to request an “urgent” favor or payment.

4. Malware and Fake Apps

Unlike financial scams, these only require you to install a file. Once active, malicious apps can quietly monitor your device, intercept authentication messages, and steal stored credentials.

3-Step Security Checklist

Telegram’s most vital protections are often turned off by default. Follow these steps to secure your account:

Step 1: Lock Down Your Login

  • Enable Two-Step Verification (2FA): Go to Settings > Privacy and Security > Two-Step Verification. This adds a password requirement in addition to the login code.
  • Audit Active Sessions: Check Settings > Devices. Terminate any session on a device you do not recognize.

Step 2: Reduce Your Exposure

  • Hide Your Phone Number: Set “Who can see my phone number” to “Nobody” or “My Contacts” in Privacy settings.
  • Restrict Group Invites: Prevent strangers from adding you to scam groups by setting “Groups & Channels” to “My Contacts” only.

Step 3: Verify and Report

  • Double-Check Money Requests: If a friend asks for money, verify their identity via a phone call or a different app first.
  • Block and Report: If you encounter a scammer, tap their profile name, select “Report,” and choose “Scam”.

Is Telegram Safe?

Telegram offers built-in security, but its default configuration places the burden of protection on the user. While “Secret Chats” use end-to-end encryption, standard chats are stored on Telegram’s cloud servers to allow syncing across devices. Scammers exploit this open design through social engineering rather than technical hacks.

Proactive Protection with NordPass

While locking down Telegram is essential, scammers often target the email or cloud accounts linked to your identity. NordPass helps prevent account takeover by generating and storing unique, complex passwords for every service you use. If one account is leaked, your others remain safe.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.