Skip to content

Project Dependency Mapping: A Strategic Pillar for IT Success

Project Dependency Mapping is the process through which interdependency relationships between different projects, tasks, teams, and resources are identified, documented, and managed. This, to put it in rather technical and cold terms. 

Let’s say it in simple words: it’s the tracking activity that allows you to know which part of the work depends on another, what blocks could arise, and how to intervene in advance. 

In short, it’s a fundamental discipline for every modern IT organization that wants to ensure effective planning, reduce delay risks, and optimize the use of available resources. To put it another way: for any company that doesn’t want to be left behind. 

In the current IT ecosystem, where software implementations, infrastructure rollouts, update management, and cybersecurity continuously intersect, this process becomes an indispensable lever for: 

  • Ensuring correct and optimized resource allocation. 
  • Avoiding delivery delays. 
  • Preventing operational bottlenecks. 
  • Fostering collaboration between teams, eliminating organizational silos. 
  • Planning all processes with precision and flexibility. 
  • Reacting agilely to changes and priority shifts. 

We will return extensively to all of this in the rest of the article, but we want to emphasize a central point from the outset: it’s not just about coordinating technical tasks, but about building an integrated vision that relates times, responsibilities, tools, and strategic objectives. A more general paradigm shift. A decisive step toward full digital maturity. 

Project Dependency Mapping, in fact, allows for solid governance, greater predictive capacity, and operational flexibility that can make the difference, especially in dynamic and interconnected environments… which are exactly the environments where today’s main market challenges are played out. 

Project Dependency Mapping – Why It’s Crucial in IT Strategy 

In the lifecycle of an IT project, every phase can be impacted by other ongoing initiatives: so far, all quite intuitive. Yet, dependencies are not always visible to the naked eye. Some of these are evident; a few examples? A software release that depends on the completion of a testing phase, the start of a deployment activity that requires the completion of infrastructure configuration, or the integration of an ERP module subordinated to the delivery of an API package from another team. But there are also several dependencies that, instead, can be much less visible: a security policy that delays a cloud migration, a system update that gets postponed because the network team is working on another priority project, or an approval request tied to an IT budget blocked by an internal decision-making process still in progress… just to cite only a few common cases. 

In such a context, therefore, mapping dependencies means primarily making all this visible, so it can be kept under control. But not only that. 

The most important point, actually, is another and goes beyond: moving from reactive to proactive management of IT processes. And this is where Project Dependency Mapping directly connects to an effective IT Governance concept. Think about it: in the end, it’s precisely the tool that allows transforming digital complexity into a competitive advantage. 

Get the latest ITSM insights! Explore AI, automation, workflows, and more—plus expert vendor analysis to meet your business goals. Download the report now!

The Main Types of Dependencies to Monitor 

Let’s say it clearly: it’s impossible to provide an exhaustive list of all the types of dependencies to keep under control with Project Dependency Mapping systems. Much depends on the individual company and the context within which it operates. However, it’s certainly possible to identify the main types, valid for all types of business. We list them below: 

  • Temporal dependencies. Simply put, one activity cannot start until another is completed. 
  • Logical dependencies: that is, based on causal relationships. Let’s see some examples: a hardware configuration necessary to test software; the preparation of development environments before being able to start debugging an application; or the need to complete the requirements gathering phase before defining the system architecture. 
  • Resource dependencies. A very common situation, where multiple projects share the same team and/or the same infrastructure. 
  • Organizational dependencies. A point that may or may not be connected to the previous one. Here we mainly talk about dependencies related to decisions, approvals, or budgets managed by other departments. 
  • Technical dependencies: that is, linked to compatibility between systems or the need to integrate new technologies. Also in this case, here are some practical examples: legacy software that needs middleware (therefore a “bridge”) to communicate with a new cloud platform; a third-party library that must be updated before proceeding with application deployment; or, again, the need to synchronize integration between ERP and CRM systems to ensure correct data flow. 

Technological Vanguard in Project Dependency Mapping 

Let’s start again from an awareness, which is a rather obvious consequence of what we have examined so far: mapping dependencies manually is practically impossible in complex business realities. Dedicated and tailored tools are needed. Above all, efficient integration with the most advanced ITSM software or Project Portfolio Management (PPM) platforms is needed. 

And here we come to practice: solutions like EV Service Manager allow integrating project data with those related to – for example – ticketing, incident management, asset management, and service requests, facilitating dependency identification and automation of alerts and priorities. 

Not only that. Even more crucial becomes integration with monitoring solutions like EV Observe, which allow automatically detecting changes in infrastructure and IT flows, anticipating potential conflicts between projects and systems. 

In short, we can imagine the infrastructure itself as a complex network of dependencies (and interdependencies). An holistic but also detailed vision is needed. Automation is needed (a crucial theme we return to in the next paragraph), but also an “orchestra direction” that allows teams to make increasingly informed strategic decisions. 

The Decisive Added Value of Automation and AI 

The introduction of Artificial Intelligence and automation allows a further step forward in Project Dependency Mapping. To put it very synthetically: with this turning point, systems not only track dependencies but learn from them. 

Thanks to Machine Learning, in fact, it’s possible not only to automatically register new interdependencies based on collected data, but also to optimize project decisions with increasingly sophisticated predictive capabilities. 

Is this something that concerns the future? No; it’s the present. And it already has many practical implications, including: 

  • Analyzing recurring patterns of failure or delay. 
  • Proactively suggesting new priorities. 
  • Simulating alternative planning scenarios with relative pros and cons. 
  • Improving workload forecasting. 
  • Recognizing weak signals in operational flows to activate corrective actions before a problem becomes critical. 
  • Integrating Project Dependency Mapping with real-time monitoring dashboards for instant visibility on the impact of every variation. 
  • Offering strategic insights to stakeholders, through automatic reports on constraints, bottlenecks, and optimization opportunities. 

The list could go on much longer (but would deserve more in-depth and separate treatment). 

Before moving on to best practices for implementing Project Dependency Mapping, we want to emphasize another decisive aspect, which has to do with continuous improvement. Artificial intelligence, in fact, favors standardization of analyses, reducing subjectivity in priority evaluation and facilitating faster alignment between teams. How? By learning from previous versions of similar projects, capitalizing on experience to improve future performance. A bit like we humans have always done… but with infinitely greater computing power. 

Best Practices for Implementing Effective Project Dependency Mapping 

As we always like to emphasize in our blog, best practices should not be confused with a universally valid recipe. Much depends on the characteristics of one’s organization, the context in which it is immersed, the bases from which one starts, legacy systems, and the specific objectives one sets. 

Having made this necessary premise, however, pillars valid for all types of realities can be identified when it comes to implementing effective and continuously evolving Project Dependency Mapping. We list them below: 

  • Define a coherent framework. Use recognized standards like those of ITIL to structure workflows and dependencies between services. 
  • Involve all stakeholders. Every team must be aware of its own dependencies and how its work impacts (and depends on) that of others. 
  • Use dynamic dashboards. Interactive and real-time visualizations allow understanding connections between tasks, projects, and departments intuitively. 
  • Plan periodic reviews. Dependencies change. The mapping must be constantly updated to reflect the continuously evolving reality. 

Conclusion 

In an increasingly distributed, complex IT context driven by continuous change, ignoring interdependencies between projects is an unforgivable error. Project Dependency Mapping is not just a set of technical tools: it’s a strategic discipline. And those who master it are able to transform complexity into value. 

Get the latest ITSM insights! Explore AI, automation, workflows, and more—plus expert vendor analysis to meet your business goals. Download the report now!

About EasyVista  
EasyVista is a leading IT software provider delivering comprehensive IT solutions, including service management, remote support, IT monitoring, and self-healing technologies. We empower companies to embrace a customer-focused, proactive, and predictive approach to IT service, support, and operations. EasyVista is dedicated to understanding and exceeding customer expectations, ensuring seamless and superior IT experiences. Today, EasyVista supports over 3,000 companies worldwide in accelerating digital transformation, enhancing employee productivity, reducing operating costs, and boosting satisfaction for both employees and customers across various industries, including financial services, healthcare, education, and manufacturing.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

MSPs Bring the Heat (and the Security) This Summer

The cyber domain has emerged as a pivotal battlefield in the intensifying confrontation between Israel and Iran. No longer confined to silent cyber-espionage, this conflict now spans precision cyber strikes, infrastructure sabotage, psychological operations, and narrative warfare driven by AI-generated disinformation. From the takedown of critical banking systems to symbolic defacements and cross-border cyber leaks, both state actors and hacktivist groups are actively shaping a volatile threat landscape.

But the cyber fallout is not isolated to the Middle East. The United States, due to its strategic alliances, critical infrastructure, and role in global cyber governance, is increasingly in the crosshairs. U.S. federal agencies, defense systems, utilities, and corporate networks face growing risks from Iranian-linked threat actors, either as direct retaliation or through collateral damage from supply chain exposures and shared cloud infrastructure.

Recent advisories from CISA and DHS underscore the concern: Iranian APTs and ideologically motivated hacktivists are probing for weaknesses, weaponizing psychological operations, and exploiting unpatched systems. Disinformation campaigns, some of which are generated by AI, are targeting the U.S. public and media, aiming to manipulate narratives and erode trust during geopolitical flashpoints.

As cyber operations become more autonomous, scalable, and integrated with kinetic warfare, the U.S. must reckon with a multipolar threat environment. This report analyzes the technical, strategic, and operational dynamics of the Israel–Iran cyber war, examines the trajectories of hacktivist and disinformation activity, and outlines the clear and present implications for U.S. national security, critical infrastructure, and private sector resilience.

### Israel-Iran ceasefire June 24 update ###

While diplomatic channels have successfully negotiated a ceasefire between Israel and Iran in the physical domain, the cyber battlefield shows no signs of de-escalation. Unlike conventional military operations that can be halted by diplomatic agreements, cyber operations persist in the shadows: unacknowledged, deniable, and continuing at full intensity. Intelligence sources indicate that both state-sponsored APT groups and ideologically motivated hacktivist collectives view the ceasefire as irrelevant to their operations. 

In fact, some analysts suggest cyber activities may intensify as both nations seek to gain strategic advantages while constrained from kinetic action. The nature of hacktivist groups and their future, as we expect it, will be escalated actions even as missiles remain grounded. For US companies, this creates a paradoxical situation: while headlines may suggest reduced tensions, the cyber threat level remains at critical, with Iranian-affiliated actors redirecting resources from physical to digital operations. 

National Terrorism Advisory System Bulletin 

DHS issued this “heightened threat” NTAS bulletin in response to escalating Israel–Iran hostilities, including U.S. airstrikes targeting Iranian nuclear sites. This alert, valid through September 22, 2025, outlines risks to the homeland. We can see ongoing attack attempts and the need to pull off a successful cyberattack.

Key U.S. threat components

  • Pro-Iranian hacktivists are likely to launch low-level cyberattacks against U.S. networks.
  • Iranian government-affiliated actors may conduct more sophisticated cyber intrusions.
  • U.S. officials previously linked to the killing of Iranian commanders (e.g., January 2020 drone strike) remain potential targets.
  • Religious edicts or “fatwas” from Iranian leadership could spur lone actors to violence.
  • Anti‑Semitic and anti‑Israel ideology could fuel hate crimes, particularly against Jewish communities or pro-Israel targets.
  • FTOs like Hamas, Hezbollah, Houthis, and PFLP have publicly called for attacks onthe  U.S. 

DHS Issues National Terrorism Advisory System Bulletin Amid Israel-Iran Conflict

Advisory & mitigation measures

  • The bulletin notes no credible, specific threats to U.S. territory yet
  • DHS encourages reporting suspicious behavior through networks like CISA, NSI, local law enforcement, the FBI, and the Fusion Centers
  • CISA provides updated cybersecurity practices to secure U.S. government and private sector networks.
  • Citizens urged to use “If You See Something, Say Something®” to report online or physical threats.

National Terrorism Advisory by DHS:  National Terrorism Advisory System Bulletin – Issued June 22, 2025

Threat Landscape Observation

Our Cyber Threat Intelligence (CTI) team is actively monitoring the evolving cyber threat landscape resulting from the Israel–Iran conflict, with a particular focus on its implications for U.S. companies. This ongoing analysis is focused on identifying potential risks and impacts to Guardz customers and partners.

June 2025 Update: Hacktivist Activity Escalation

The ongoing geopolitical conflict has triggered a significant uptick in cyber operations, particularly from ideologically motivated hacktivist groups. As of June 2025, we have identified over 120 active hacktivist groups engaged in cyber campaigns linked to the Israel–Iran war.

Notably, nine pro-Russian hacktivist groups have aligned themselves in support of Iran. Among them, Noname057(16) has taken a leading role, conducting coordinated DDoS attacks against Israeli infrastructure and digital services.

Despite the rise in activity, internal disputes among hacktivist factions and regional internet disruptions, particularly in parts of Iran, are contributing to temporary fluctuations in attack volume and consistency.

Geopolitical Spillover: Cross-Border Targeting Patterns

The impact of this cyber conflict has extended well beyond Israel and Iran, affecting multiple countries through targeted campaigns:

Note: The following groups are only part of the complete list. 

United States

Targets include:

  • Arabian Ghosts
  • Unknowns Cyber Team
  • DieNet
  • Elite Squad
  • Mr Hamza
  • Moroccan Black Cyber Army
  • Mysterious Team Bangladesh

Following the United States military strikes on Iran, a few more hacktivist groups have openly declared intent to target U.S. digital infrastructure. These declarations mark a strategic escalation, signaling that the cyber retaliation phase is no longer limited to Israeli assets.

These actors, previously active in attacks on Israeli and European systems, are now pivoting toward American entities. Their known capabilities include:

  • Coordinated DDoS campaigns against government and financial services
  • Credential stuffing and data leaks against public sector platforms
  • Disinformation operations through social engineering and Telegram-based leaks

These groups operate with ideological alignment to Iran’s cyber doctrine, and some share toolkits and IOCs with APT-affiliated operations.

Guardz ITDR in Action

Since the beginning of June, our Cyber Threat Intelligence (CTI) has significantly intensified its monitoring operations in response to rising geopolitical tensions and the corresponding increase in coordinated threat actor activity. This surge, fueled by the Israel–Iran conflict, has broadened its scope beyond regional interests, introducing new risks to U.S.-based organizations and infrastructure.

This enhanced monitoring is layered on top of our existing telemetry-driven detection framework, which continuously profiles customer environments to identify deviations from established baselines. Behavioral anomalies, irregular authentication patterns, unusual process executions, and suspicious external communications are flagged in real time and correlated against threat intelligence feeds, IOCs, and TTPs from both open-source and classified sources.

Our approach ensures we maintain visibility not only into direct attacks but also into emerging threats that may impact customer environments indirectly via shared cloud services, vendor infrastructure, or third-party software dependencies. This posture allows us to respond with high agility to any indication of adversarial activity, whether it originates from APT groups, coordinated hacktivist collectives, or opportunistic cybercriminals attempting to exploit the geopolitical chaos.

To date, we have observed a high volume of attempted access originating from known malicious sources. However, no successful compromises or unauthorized access have been identified.

Below are some of the attempts, Iran’s infrastructure, and the results. 

  • 180+ coordinated attack attempts from Iranian infrastructure
  • Hundreds of unique Iranian malicious IPs with AbuseIPDB scores of 30 and higher
  • Primary focus on the US, but also European and Australian entities

US TARGETS – Primary Focus

Status: Critical Threat Confirmed 

  • 163 total distinct attack attempts against US entities
  • 49 unique US organizations targeted
  • Target Sectors:
  • US Commercial
  • US Organizations
  • US Networks
  • US Education

Canadian Target – Secondary Focus

  • 11 total distinct attack attempts against Canadian entities
  • 8 unique Canadian organizations targeted
  • Targeted Canadian Entities: Pinnacle Networks, Pinnacle Office, Benefits Alliance

Europe Targets – Threat Activity 

  • 117 total distinct attack attempts against EU entities
  • 42 unique EU organizations targeted
  • 71 distinct Iranian attack IPs deployed

Australian Targets – Threat Activity 

  • 173 total distinct attack attempts against AU entities
  • 71 unique AU organizations targeted
  • 126 distinct Iranian attack IPs deployed

Tactical Analysis

The observed threat activity reflects a structured and persistent credential abuse campaign, with indicators suggesting links to Iranian-aligned threat actors or proxy groups operating infrastructure in support of state objectives.

The frequent appearance of locked accounts indicates a deliberate account lockout strategy, likely designed to perform user enumeration by provoking lockout conditions across known or guessed usernames. This technique allows threat actors to validate the existence of accounts and map tenant user surfaces with high confidence.

The presence of incorrect credentials further supports a pattern of password spraying and brute-force testing. The attackers appear to rotate between usernames and low-complexity passwords, triggering both invalid credential responses and smart lockouts, which suggests automation is behind the attempts.

Moreover, the recurrence of the same IP addresses across a 20+ day window is often linked to multiple account targets. It demonstrates persistent infrastructure reuse, strongly implying coordinated campaigns rather than opportunistic scanning. This level of consistency indicates that adversaries are leveraging stable, likely compromised, or proxy-based infrastructure to maintain access and continuously probe identity surfaces without detection.

This behavior aligns with TTPs commonly observed in pre-breach recon and access phases used by APTs and credential-focused threat groups targeting cloud identity systems.

Summary

The cyber conflict between Iran and Israel has intensified into a sustained campaign of offensive operations that extend far beyond traditional espionage. What began as targeted cyber intrusions has evolved into massive attempts on critical infrastructure, coordinated disinformation campaigns, and widespread hacktivism involving over 120 groups, many of which are ideologically or politically aligned with Iranian interests. 

Following U.S. military actions and its continued alliance with Israel, several pro-Iranian hacktivist groups have declared the United States a legitimate target. These groups are launching cyber campaigns against U.S. government networks, private sector organizations, and critical infrastructure operators. Attacks range from denial-of-service operations and defacements to data exfiltration and social engineering, all intended to create disruption, instill fear, and demonstrate cyber reach.

Compounding the threat is the use of AI-generated content to fuel psychological operations and disinformation across social media platforms. These influence campaigns aim to manipulate public perception, amplify divisions, and erode trust in institutions during periods of geopolitical crisis.

The risks are not limited to direct attacks. U.S. organizations with supply chain dependencies, cloud hosted services, or partnerships with Israeli entities may experience collateral impact or become vectors for exploitation. The DHS and CISA have issued multiple advisories urging enhanced vigilance, accelerated patching, and proactive monitoring. As the cyber and kinetic dimensions of this conflict continue to converge, the United States faces a persistent and evolving threat landscape shaped by state actors, hacktivist coalitions, and information warfare tactics.

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Critical Zero-Day in CrushFTP Actively Exploited

 

Introduction

On July 18, 2025, CrushFTP, a leading provider of managed file transfer (MFT) software, disclosed a critical zero-day vulnerability, CVE-2025-54309. This vulnerability exposes a glaring weakness in the AS2 validation mechanism of its web management interface. With a CVSS score of 9.8, the flaw enables remote, unauthenticated attackers to gain complete administrative control over affected CrushFTP servers.

This post offers a detailed, technical walkthrough of the vulnerability, its exploitation, real-world impact, and recommended defensive measures. Drawing from vendor advisories, Shodan scans, and independent research, this analysis provides a full-spectrum view necessary for security teams to act decisively.

CrushFTP and Its Role in Managed File Transfer

CrushFTP is a widely used file transfer platform that supports multiple protocols, including HTTP(S), FTP, and AS2. Organizations utilize it for secure and reliable data exchange, often within complex supply chains or between business partners.

  • Why CrushFTP? It combines ease of deployment with flexible protocol support, making it popular in enterprise environments.
  • AS2 Protocol Support: AS2 is essential for Electronic Data Interchange (EDI), a widely used technology in industries such as retail, logistics, and manufacturing.
  • Attack Surface: The web management interface offers rich functionality but also creates a significant attack surface if not properly secured.

Vulnerability Breakdown: Understanding CVE-2025-54309

Description

CVE-2025-54309 arises from improper AS2 validation within the CrushFTP web interface when the DMZ proxy feature is disabled. This flaw allows attackers to send crafted HTTPS requests that bypass authentication and gain administrative privileges.

Attackers are likely to have reverse-engineered recent code changes, exploiting a previously patched but overlooked bug in the AS2 message processing logic.

The critical vulnerability CVE-2025-54309 in CrushFTP centers on a flaw in how the software processes AS2 protocol messages within its web management interface, particularly when the DMZ proxy feature is disabled. To fully appreciate the severity of this issue, it is essential to understand both the protocol involved and the nature of the validation failure.

AS2 Protocol and Its Importance

AS2 (Applicability Statement 2) is a widely adopted standard for secure and reliable electronic data interchange (EDI) over HTTP and HTTPS. It ensures message integrity, confidentiality, and non-repudiation by leveraging digital signatures, encryption, and delivery receipts. Many enterprises rely on AS2 for critical business communications, placing a premium on robust and accurate protocol handling.

The core issue with the improper AS2 validation

CVE-2025-54309 stems from improper validation of incoming AS2 messages. Typically, these messages undergo rigorous checks to verify headers, MIME boundaries, digital signatures, and certificate trust. However, when the DMZ proxy feature in CrushFTP is disabled, this protective layer is bypassed, forcing the server to rely on its internal AS2 validation logic.

Due to a flaw in this internal processing, the server incorrectly accepts crafted AS2 requests without enforcing necessary authentication and integrity checks. This creates an unprotected alternate channel allowing remote attackers to gain unauthorized administrative access simply by sending specially crafted HTTPS requests.

Why This Flaw Is Particularly Dangerous

This vulnerability is not a typical authentication bypass. Instead, it exposes a deep protocol parsing weakness at the intersection of cryptographic verification and session management. Attackers exploiting this flaw gain full administrative privileges without prior authentication, which is an exceptionally rare and highly impactful vulnerability.

Moreover, the attack leverages HTTPS, blending seamlessly with legitimate encrypted traffic. As a result, traditional security controls such as network-based intrusion detection and simple application logs may fail to flag this malicious activity.

The Critical Role of the DMZ Proxy

The DMZ proxy feature serves as a gatekeeper for AS2 messages, validating their authenticity and integrity before forwarding them to the internal server. When enabled, it effectively mitigates this vulnerability by enforcing strict protocol compliance and blocking malformed or malicious messages.

Disabling the DMZ proxy removes this safeguard, leaving the backend server exposed to unfiltered AS2 traffic. The flaw in the internal validation logic then becomes exploitable, providing a direct pathway for attackers to exploit.

Exploitable Attack Surface

The flaw exposes several critical attack vectors, including:

  • Remote, unauthenticated access to administrative functions.
  • Exploitation through standard HTTPS channels makes detection difficult.
  • Bypassing of session and CSRF protections within the web management interface.
  • Creation of persistent, stealthy accounts through manipulation of user identifiers.

Attack Mechanics: How the Exploit Works

Exploitation Steps in a nutshell

Crafting Malicious AS2 Messages: Attackers generate AS2 messages with manipulated headers and payloads to bypass authentication.

Bypassing Authentication: These crafted requests exploit the alternate channel flaw to establish a remote, authenticated administrative session.

Gaining Full Admin Control:  Once authenticated, attackers can create or modify user accounts, upload or download files, and manipulate server configurations.

Maintaining Persistence: Attackers may create long, random user IDs (e.g., 7a0d26089ac528941bf8cb998d97f408m) for stealth persistence.

Indicators of Compromise

  • Unauthorized updates to the internal default user account, specifically “last_logins” field changes inside MainUsers/default/user.XML.
  • File modification timestamps for the default user.XML is inconsistent with regular maintenance.
  • Appearance of unusual user accounts with random alphanumeric IDs.

Challenges in Detection

  • AS2 traffic complexity masks malicious payloads.
  • Many environments lack dedicated AS2 traffic inspection.
  • An attack typically leaves minimal network-level forensic traces, aside from application logs.

Impact, What’s at Stake?

Business Risk

  • Data Loss: Exfiltration of sensitive or regulated information.
  • Operational Downtime: Service interruption due to malicious tampering or recovery efforts.
  • Compliance Violations: Exposure of Personally Identifiable Information (PII) or Intellectual Property (IP).
  • Reputational Damage: Breach of trust with customers and partners.

Technical Risk

  • Complete server control facilitates pivoting into internal networks.
  • Attackers can implant ransomware or backdoors.
  • Potential disruption of critical EDI communications.

Global Exposure 

Shodan Exposure Data

  • Over 300,000 publicly accessible CrushFTP web interfaces globally.
  • Largest concentrations in the United States (~46,000), India (~20,000), Australia (~19,000), Japan (~18,000), and the UK (~11,000).

Exploitation in the Wild

  • Confirmed active exploitation since July 18, 2025.
  • Approximately 1,040 unpatched, internet-facing servers remain vulnerable, primarily located in North America and Europe.
  • Attackers adapted quickly following prior AS2 fixes, indicating the presence of targeted and persistent threat actors.

ShadowServer scanning for unpatched CrushFTP instances vulnerable to CVE-2025-54309. 

Mitigation Strategies

Patching

  • Patch Immediately Upgrade to CrushFTP 10.8.5_12 or 11.3.4_23 (or later). This fully fixes the AS2 validation flaw.
  • Restrict Admin Access Use IP allow-lists, VPNs, or Zero Trust to limit access to the admin interface. Never expose it directly to the internet.
  • Verify Integrity Check file hashes, especially MainUsers/default/user.XML. Look for unauthorized changes or newly created admin accounts.
  • Disable or Isolate AS2 if you don’t use AS2, disable it. Otherwise, route AS2 traffic through a DMZ proxy.
  • Audit for Indicators of Compromise (IoCs)  Look for:
  • New random user IDs
  • Modified default user configs
  • Admin UI appearing for regular users

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Security Notice Update #1

Graylog Security Notice – Escalated Privilege Vulnerability

Date: 24 June 2025
Severity: High
CVE ID: submitted, publication pending
Product/Component Affected: All Graylog Editions – Open, Enterprise and Security

 

Summary

We have identified a security vulnerability in Graylog that could allow a local or authenticated user to escalate privileges beyond what is assigned. This issue has been assigned a severity rating of High. If successfully exploited, an attacker could gain elevated access and perform unauthorized actions within the affected environment.

 

Affected Versions

Graylog Versions 6.2.0, 6.2.1, 6.2.2 and 6.2.3

 

Impact

Graylog users can gain elevated privileges by creating and using API tokens for the local Administrator or any other user for whom the malicious actor knows the ID.

For the vulnerability to be exploited, an attacker would require a user account in Graylog. Once authenticated, the malicious actor can proceed to issue hand-crafted requests to the Graylog REST API and exploit a weak permission check for token creation.

Update June 30th, 2025: Please see CVE-2025-53106 for details

 

Workaround

In Graylog version 6.2.0 and above, regular users can be restricted from creating API tokens. The respective configuration can be found in System > Configuration > Users > “Allow users to create personal access tokens”. This option should be Disabled, so that only administrators are allowed to create tokens.

 

Full Resolution

A fix has been released in Graylog Version 6.2.4. We strongly advise all affected users to apply the patch as soon as possible.

6.2.4 Download Link

6.2.4 Changelog

 

Recommended Actions

Check Audit Log (Graylog Enterprise, Graylog Security only)

Graylog Enterprise and Graylog Security provide an audit log that can be used to review which API tokens were created when the system was vulnerable. Please search the Audit Log for action: create token and match the Actor with the user for whom the token was created. In most cases this should be the same user, but there might be legitimate reasons for users to be allowed to create tokens for other users. If in doubt, please review the user’s actual permissions.

 

Review API token creation requests

Graylog Open does not provide audit logging, but many setups contain infrastructure components, like reverse proxies, in front of the Graylog REST API. These components often provide HTTP access logs. Please check the access logs to detect malicious token creations by reviewing all API token requests to the /api/users/{user_id}/tokens/{token_name) endpoint ( {user_id) and {token_name) may be arbitrary strings).

 

Graylog Cloud Customers

Please note: All Graylog Cloud environments have already been updated to version 6.2.4 and have also been successfully audited for any attempt to exploit this privilege escalation vulnerability.

About Graylog
At Graylog, our vision is a secure digital world where organizations of all sizes can effectively guard against cyber threats. We’re committed to turning this vision into reality by providing Threat Detection & Response that sets the standard for excellence. Our cloud-native architecture delivers SIEM, API Security, and Enterprise Log Management solutions that are not just efficient and effective—whether hosted by us, on-premises, or in your cloud—but also deliver a fantastic Analyst Experience at the lowest total cost of ownership. We aim to equip security analysts with the best tools for the job, empowering every organization to stand resilient in the ever-evolving cybersecurity landscape.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How to lock apps on an iPhone

What’s the difference between locking and hiding an app?

The difference between locking and hiding an app is that locking leaves the icon in view but guards its contents behind Face ID, Touch ID, or a passcode, whereas hiding removes the icon altogether and places the app itself into a hidden folder protected by Face ID.

You can think of locking as putting a digital padlock on an icon that’s still visible on your home screen. Tap the icon, look at the phone, and Face ID authorizes you. Anyone who picks up your phone can see the app is installed — they just can’t access its content without your face, your fingerprint, or your device passcode.

Hiding goes one step farther — the icon disappears from the home screen, from Spotlight search, and even from the app library. The app moves to a new, Face ID-protected “Hidden” folder. In other words, locking keeps data private, while hiding keeps the entire app out of sight unless you know exactly where to look.

How to lock an app on your iPhone

  1. Touch and hold the app icon until the quick-actions menu appears.

  2. Tap “Require Face ID.” (On older hardware, the wording might differ: “Require Touch ID” or “Require passcode.”)

  3. Authenticate once. From now on, every tap brings up Face ID.

Opening a locked app

Tap the icon and look at the screen. If Stolen Device Protection is turned on and you are away from a familiar location, Face ID is mandatory — your passcode will not unlock the app.

Removing the lock

Touch and hold the icon again, choose “Don’t require Face ID,” authenticate, and the padlock disappears.

How to hide an app on your iPhone

  1. Long-press the icon, choose “Require Face ID,” and authenticate.

  2. Long-press once more, select “Hide app,” and authenticate again. The icon vanishes immediately, and the app moves to the “Hidden” folder at the bottom of the App Library.

Opening a hidden app

Swipe down on the “Home screen,” type the app’s name, select the result labelled “Hidden,” then pass the biometric prompt. The app opens but remains invisible to everyone else.

Unhiding an app

Open the “Hidden” folder, touch and hold the app, pick “Unhide,” authenticate, and the icon returns to its previous home screen spot.

 

How can you lock apps on earlier iOS versions?

If your iPhone is still on iOS 17 or below, you cannot apply the new “Lock” or “Hide” commands, but you can mimic the same protection with three built-in tools. The steps below are detailed so you can follow them without guessing.

Screen time

  1. Open “Settings” and select “Screen time.”

  2. Tap “Turn on screen time” if it is off.

  3. Choose “Use screen time passcode,” set a four-digit code, and (if offered) link it to Face ID for easier entry.

  4. Tap “App limits” and select “Add limit.”

  5. Expand a category to reveal individual apps, select the one you want to lock, and tap “Next.”

  6. Set the timer to 1 minute, then enable “Block at end of limit.”

  7. Exit “Settings.”

Guided access

  1. Navigate to “Settings” and select “Accessibility.”

  2. Tap “Guided access” and switch it on.

  3. Tap “Passcode settings” and choose “Set guided access passcode.” Select a six-digit code, and enable Face ID or Touch ID if you prefer biometrics.

  4. Open the app you plan to lock, then triple-click the side (or home) button.

  5. If the overlay appears, simply tap “Start.”

  6. To leave the pinned session, triple-click again, enter the passcode or use Face ID, and tap “End.”

Shortcuts automation

  1. Open “Shortcuts,” and go to the “Automation” tab.

  2. Tap “+,” then “Create personal automation.”

  3. Scroll down, choose “App,” and tap “Choose.”

  4. Select the target app, confirm “Is opened,” and choose “Next.”

  5. Tap “Add action,” search for “Ask for input,” and set the prompt text to “Enter passphrase.” For “Input type”, pick “Number” or “Text.”

Tips to keep apps and data secure

Relying solely on a new lock icon is insufficient. Activate Face ID or Touch ID inside every banking, health, or mail app that supports internal biometric gates. In “Notification settings,” set “Show previews” to “Never” so message content is not exposed on the lock screen. Replace six numeric digits with a longer alphanumeric device passcode. Finally, relocate every password, passkey, or credit card detail to an encrypted vault such as NordPass password manager.

Why NordPass is the essential add-on

A locked or hidden app keeps strangers from launching it, but the credentials inside can still leak in a data breach. NordPass solves that problem by encrypting every password locally before syncing. After a single Face ID check, NordPass autofills your login with a 30-character password — no need to reuse or remember anything. Passkeys created on a Mac land on your iPhone in seconds. Secure Notes protect passport numbers or alarm PINs, and the built-in Breach Scanner alerts you if any saved email address appears in a public leak. Explore the full feature list and discover what NordPass brings to the table.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Cybersecurity for startups: Key ways to stay protected

Cybersecurity for startups blog cover

Summary: All startups face threats like breaches and phishing, but the right mix of cybersecurity tools and strategies can keep them protected.

Sorry to break it to you, but if you’re running a startup—even just a small one—you’re up against the same cyber threats as large enterprises. In fact, you might be at more risk than any of those big corporations. Why’s that? Because bad actors know most startups don’t have advanced security measures in place. And that makes them more attractive targets.

Studies show that 43% of cyberattacks focus on small businesses. And yes, most startups fall into that category—so you need to defend yourself. How do you do that? First, let’s discuss what cybersecurity challenges you’re up against, then help you find the right tools and strategies to protect your startup.

Key takeaways

  • All startups face serious cybersecurity challenges like data breaches, ransomware, and phishing.
  • Startups can improve cybersecurity by using tools like VPNs or ZTNA solutions, firewalls, and threat protection platforms.
  • A small startup can boost its cybersecurity for around $2,000, using just the basic tools and strategies.
  • NordLayer offers many top cybersecurity solutions in one product, letting startups focus on growth safely.

Why do cybercriminals target startups so much?

It’s pretty simple—cybercriminals assume startups don’t have the time, budget, or resources to build strong cybersecurity defenses. More often than not, they’re right. That’s why startups tend to be much more vulnerable than large enterprises, which usually invest heavily in the latest cybersecurity solutions like endpoint protection, threat detection, and intrusion prevention systems.

And then there’s the payoff. For bad actors, breaking into a startup’s systems can be like discovering a goldmine. Once they get inside, they might:

  • Steal your ideas and try to sell them to your competitors
  • Put your customer data for sale on the dark web
  • Lock up your systems and demand a ransom to unlock them

All of this can earn them a lot of money while putting your funding at risk and slowing down your growth before you even get started.

To sum up, attackers see startups as easy targets with weak security, and they know there’s big money to be made when they successfully attack them.

Cyber threats all startups must face

Like we said in the beginning, it doesn’t matter whether you’re a small startup or a big corporation. In the end, you’re facing the same cybersecurity challenges. And unfortunately, there are many you need to watch out for. Let’s go over the biggest cyber threats you should be aware of.

Ransomware attacks

Okay, picture this: you go to work, open your laptop, and try to pick up where you left off, but… your files won’t open. You try a few times, but nothing works. Next, you get an email saying that if you want your files back, you’ll have to pay—and it won’t be cheap. That’s basically what a ransomware attack looks like: bad actors break into your system, encrypt your files, and demand a big payment to decrypt them.

Even if you decide to pay the ransom, there’s no guarantee that attackers will actually restore your access. And while you wait for them to do so, your startup could be dealing with production downtime, potential loss of intellectual property, exposure of sensitive customer data, or legal issues due to a lack of regulatory compliance. It’s really hard to find a silver lining in this scenario.

Data breaches

Probably one of the biggest nightmares for any business is finding out that its sensitive information has been compromised. Unfortunately, this happens more and more often, with the average cost of a data breach now being almost $5 million.

Therefore, your startup should be prepared for cybercriminals targeting your customer data, intellectual property, or any other sensitive information that could land you in trouble if leaked. Because if they pull it off, the results can be devastating. We’re talking stolen employee identities, costly legal fines for failing to comply with regulations, your operations coming to a grinding halt, and more.

Phishing attacks

Phishing attacks are scams designed to trick people into giving away sensitive information, either personal or related to the company they work for. These attacks often come as fake emails, suspicious text messages, or websites that look like they come from a legitimate source.

Attackers often create a sense of urgency to pressure people into clicking a harmful link, downloading infected files, or entering their login details. If someone falls for it, threat actors can access company systems, steal valuable data, and use it to make money illegally.

Human error

Everyone makes mistakes. But when one mistake hurts the whole company, things get serious fast. Studies show that human error is behind a huge number of cyber-attacks. Some research even suggests that up to 95% of data breaches start with an employee’s mistake.

Sometimes, all it takes is one person clicking on a malicious link in an email they thought was legitimate—and suddenly, it’s a domino effect as system after system gets compromised.

Insider threats

Of course, security incidents caused by employees aren’t always accidental. There are situations where a person on the inside deliberately opens the door to cybercriminals—that’s what’s known as an insider threat.

Why would anyone do something like that? It could be for money, out of spite, or just to cause chaos. It’s like that quote from The Dark Knight: “Some people just want to watch the world burn.” The important part is that insiders can abuse their access rights to steal or leak sensitive data—or even sabotage your startup’s operations.

Weak passwords and credential stuffing

Studies show that people’s password habits are far from being great, with many using weak passwords like “123456” for both personal and work accounts. This suggests that your employees’ passwords might not be as strong as you think.

And it doesn’t stop there. A lot of people reuse passwords across different accounts. Why’s that a problem? Well, if one of their other accounts gets hacked and their credentials are compromised, cybercriminals might try using the same credentials to break into your startup’s systems (it’s called credential stuffing).

As you might guess, many people both use weak passwords and reuse them across accounts. And when that happens, it’s easy to see how your company could be walking a fine line between staying secure and facing a serious cybersecurity threat.

Cyber risks every startup should be ready for

Best practices for improving cybersecurity for startups

Considering all the cyber threats, it can be tough to figure out reliable cybersecurity for startups. The good news? There are plenty of tools and strategies that even small businesses can use to protect themselves effectively. Here are a few things worth adding to your startup’s security game plan.

Adopt a Zero Trust strategy

“Never trust, always verify.” That’s the core idea behind the Zero Trust model. In simple terms, it means you shouldn’t assume anyone or anything trying to access your network is trustworthy—not even people who are part of your company.

Instead, every person and device must be thoroughly verified each time using strict user authentication and real-time network monitoring. Only then can you be sure no outsider sneaks into your digital environment.

Limit access to your applications

The technologies that help bring the Zero Trust model to life are called Zero Trust Network Access (ZTNA) solutions. They help you control access to specific applications and services, isolating users from resources they don’t actually need.

Someone should only get access to specific apps after their identity, context, and compliance with policies have been carefully checked. This way, you lower the chances of unauthorized access and ensure the right employees can get to the right resources.

Implement a strong password policy

This one’s really simple—if you know that people use weak passwords at work, then you need to prevent that at your startup. There are security measures available today—like NordPass, for example—that allow you to create password policies that you can roll out across the entire company.

Once that’s set up, anyone trying to get away with a weak password will be automatically stopped. That simple step can make a big difference in keeping your startup’s passwords strong.

And if your team starts complaining about having to deal with long, complex passwords, you can get them to use a password manager to generate strong passwords and manage them with ease.

Set up multi-factor authentication (MFA)

Strong passwords are a great start, but they’re not enough to keep your startup safe today. You need extra layers of protection on your business accounts. That way, even if your credentials leak, cybercriminals can’t access your digital systems.

One way to do this is by setting up MFA. This will require anyone trying to log in to provide additional proof of identity beyond just a password. It could be a code sent to their email, a time-based one-time password from an authenticator app, or even a biometric scan, like a fingerprint or face recognition.

Some methods are more secure than others, of course, but the point is simple: with MFA, entering a password is not enough for somebody to get in.

Use firewalls to protect your network

For those who don’t know what firewalls are, they’re cybersecurity solutions that monitor incoming and outgoing internet traffic in real time. Then, based on a preestablished set of rules, they decide what’s safe and what’s not. So, if something suspicious—or downright dangerous—shows up, they block it before it can infiltrate your network.

Additionally, you can use firewalls for network segmentation. That is breaking your company network into smaller blocks called “segments” and controlling how traffic flows between them.

So, for example, you can give certain employees access to just one part of the network, without exposing the rest of it. That way, if a threat slips through, it’s more likely to stay contained in that one area instead of spreading to other parts.

Create an incident response plan

What would you do if someone attacked your company? How would you stop the damage from spreading? Where would you even start fixing what’s already broken? These are the questions you need to answer before anything happens. That’s exactly what an incident response plan is for.

The key is having clear, step-by-step instructions so everyone in your company knows what to do during a cyber-attack. With an incident response plan in place, you can act quickly, minimize damage, and keep your team calm. After all, you don’t want them to panic and add to your troubles.

Update software regularly

Most of the tools and services your startup relies on receive regular updates and patches. These are often rolled out to fix security vulnerabilities and keep up with ever-evolving cyber threats.

For that reason alone, it’s essential that you keep all your systems and devices up to date. Skipping a single update might seem harmless, but it can easily open the door to attackers, so make sure you don’t let it slip by.

Educate your team

And then there’s the human side of things—you need to help your team understand why certain security measures matter, why they should use one app over another, and how a single phishing email can trigger a devastating chain of events.

By investing in cybersecurity training, you can clear up confusion, get everyone aligned, and underscore how one serious incident could put the entire business—and everyone’s jobs—at risk.

 

How much does it cost to improve a startup’s cybersecurity?

The answer to questions like this is almost always: it depends. The cost of improving your cybersecurity can range from as little as $500 to well over $100,000 per month. “That’s quite a stretch,” you might say—so let’s unpack this a little bit.

Your startup’s size, industry, goals, and business needs all play a role in determining the necessary cybersecurity for startups. Startups running global operations usually invest those large sums of money. They do so to meet multiple compliance frameworks, manage vast amounts of business and customer data, and integrate a wide range of third-party platforms and services. At that level, cybersecurity typically requires a significant investment—at least $30,000 per month, but usually more.

That’s because it often involves a wide array of cybersecurity solutions—from advanced network access controls and threat detection tools, to cyber insurance and endpoint protection services, all the way to penetration testing and custom security audits (which can cost from $15,000 to $25,000).

What would be the cost for a small startup?

If you’re just starting out, you can probably get by with a more basic cybersecurity setup. That would typically consist of antivirus software, a firewall, basic access controls, a password manager, and multi-factor authentication tools.

With all this, and a limited number of licenses, you can likely keep costs under $2,000 a month—or even less, depending on your tools and team size. However, the rule of thumb is that startups should allocate around 5.6% to 20% of their IT budget to cybersecurity programs.

What can NordLayer do to help protect your startup?

NordLayer simplifies cybersecurity for startups by combining several network protection tools into one accessible platform.

With just NordLayer in your setup, your startup can easily follow many of the best practices we’ve discussed in this article, like enforcing Zero Trust, using MFA, segmenting your network, and setting up firewall protection.

From ZTNA-based access controls and a business-grade VPN to threat protection and threat intelligence, NordLayer delivers enterprise-level security to startups at an affordable price—all without the unnecessary complexity, steep learning curve, or heavy IT overhead.

So, if you want your startup to have security measures that can help protect it from many cyber threats, you can get NordLayer and have more time and energy for what we all know you’d rather focus on—your company’s growth.

 

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET Threat Report: ClickFix fake error surges, spreads ransomware and other malware

  • A deceptive fake error attack vector, ClickFix, surged by over 500%, becoming the second most common attack method after phishing, and responsible for nearly 8% of all blocked attacks.
  • SnakeStealer overtook Agent Tesla as the most detected infostealer, while ESET helped disrupt two major malware-as-a-service operations – Lumma Stealer and Danabot.
  • Rivalries among ransomware gangs, including RansomHub, caused internal chaos. Despite more attacks, ransom payments dropped due to takedowns and trust issues.
  • Android adware detections jumped 160% due to the Kaleidoscope malware, while NFC-based fraud spiked by more than thirty-five-fold ,with tools like GhostTap and SuperCard X enabling more digital wallet theft.
BRATISLAVAJune 26, 2025 — ESET has released its latest Threat Report, which summarizes threat landscape trends seen in ESET telemetry and from the perspective of both ESET threat detection and research experts, from December 2024 through May 2025. One of the most striking developments this period was the emergence of ClickFix, a new, deceptive attack vector that skyrocketed by over 500% compared to H2 2024 in ESET telemetry.  This makes it one of the most rapidly rising threats, accounting for nearly 8% of all blocked attacks in H1 2025 and is now the second most common attack vector after phishing. ClickFix attacks display a fake error that manipulates the victim into copying, pasting, and executing malicious commands on their devices. The attack vector affects all major operating systems including Windows, Linux, and macOS.  “The list of threats that ClickFix attacks lead to is growing by the day, including infostealers, ransomware, remote access trojans, cryptominers, post-exploitation tools, and even custom malware from nation-state-aligned threat actors,” says Jiří Kropáč, Director of Threat Prevention Labs at ESET. The infostealer landscape also saw significant shifts. With Agent Tesla fading into obsolescence, SnakeStealer (also known as Snake Keylogger) surged ahead, becoming the most detected infostealer in our telemetry. SnakeStealer’s capabilities include logging keystrokes, stealing saved credentials, capturing screenshots, and collecting clipboard data. Meanwhile, ESET contributed to major disruption operations targeting Lumma Stealer and Danabot, two prolific malware-as-a-service threats.  Before the disruption, Lumma Stealer activity in H1 2025 was higher than in H2 2024 (+21%) and Danabot was up even more, by +52%.  This shows that both were prolific threats, making their disruption that much more important. The ransomware scene further descended into chaos, with fights between rival ransomware gangs impacting several players, including the top ransomware as a service – RansomHub. Yearly data from 2024 shows that while ransomware attacks and the number of active gangs have grown, ransom payments saw a significant drop. This discrepancy may be the result of takedowns and exit scams that reshuffled the ransomware scene in 2024, but may also be partially due to diminished confidence in the gangs’ ability to keep their side of the bargain. On the Android front, adware detections soared by 160%, driven largely by a sophisticated new threat dubbed Kaleidoscope. This malware uses a deceptive “evil twin” strategy to distribute malicious apps that bombard users with intrusive ads, degrading device performance. At the same time, NFC-based fraud shot up more than thirty-five-fold, fueled by phishing campaigns and inventive relay techniques. While the overall numbers remain modest, this jump highlights the rapid evolution of the criminals’ methods and their continued focus on exploiting NFC technology. Our research into GhostTap shows how it steals card details so attackers can load victims’ cards into their own digital wallets and tap phones for fraudulent contactless payments worldwide. Organized fraud farms use multiple phones to scale these scams. SuperCard X packages NFC theft as a simple, minimalistic malware-as-a-service tool. It presents itself as a harmless NFC-related app, once installed on a victim’s device, it quietly captures and relays card data in real time for quick payouts. “From novel social engineering techniques to sophisticated mobile threats and major infostealer disruptions, the threat landscape in the first half of 2025 was anything but boring,” summarizes Kropáč about the contents of the latest ESET Threat Report. For more information, check out the ESET Threat Report H1 2025 on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X), BlueSky, and Mastodon for the latest news from ESET Research.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Validating Internal Network Policies with Mendel

Defining your internal network policies takes time, coordination, and effort. But once those policies are in place, the critical question still remains: are they actually being followed?

For many IT teams, verifying policy adherence and enforcing internal rules on a daily basis is a persistent challenge. Even small violations, such as unauthorized access, outdated encryption, or misused services, can lead to data exposure or non-compliance with frameworks like NIS2.

This is the first part of a two-part blog focused on the practical side of network security policy enforcement and explains how GREYCORTEX Mendel helps you detect violations of any size quickly and effectively. Part two will cover encryption, application use, and identity-based access control.

Network Segmentation & Perimeter Control

Segmentation and perimeter access policies are fundamental to limiting exposure and maintaining control over your critical systems.  Without a clear policy enforcement process, a single compromised device can lead to lateral movement across your network.

🔗 Watch our webinar to see how Mendel helps you detect and investigate lateral movement.


Policy violation: Unallowed east–west traffic between segments

Relevant for NIS2

East–west traffic refers to communication between devices within the internal network, such as between user devices and servers. When segmentation is not properly enforced, attackers can move laterally across segments and compromise your entire company network. Limiting this traffic is essential for helping you prevent access to critical systems.

Validation with Mendel

Mendel’s peer graph, as seen below, offers you a clear view of internal communication. Your analysts can then filter internal traffic and define specific subnets to quickly verify whether unauthorized flows occur between isolated segments.

 

Policy violation: Unauthorized Internet access from restricted segments

Relevant for NIS2

Devices in restricted segments, such as servers or backup networks, are often not intended to communicate with the public Internet directly. In many environments, internet access must go through a proxy or DMZ, with firewalls blocking all other outbound traffic. If these controls fail, systems may be exposed to malware, data leakage, or command-and-control activity.

Validation with Mendel

Mendel allows the filtering of your outbound traffic from specific hosts, making it easy to identify devices attempting to access the Internet.

If such traffic is detected, your analysts can verify whether it passed through an approved proxy by checking the flow records. They can also confirm whether direct connections (bypassing the proxy) were blocked at the firewall level by checking the TCP flags and destination status.

Mendel lets you set policies to monitor Internet traffic from specific segments or devices. When a violation occurs, it automatically sends an alert.


Policy violation: New & disappeared IPs or MACs in controlled network

Relevant for NIS2

Controlled network segments, such as server or infrastructure zones, are often designed with static IP and MAC configurations. When unrecognized devices appear, it may indicate unauthorized access, policy misconfiguration, or a potential threat. 

Validation with Mendel

Mendel allows you to assign policies to specific subnets or hosts to monitor new or missing IP and MAC addresses.  Policies can also include limits on traffic, packets, peers, ports, duration, and flows.

If a policy is violated, Mendel will trigger an alert immediately. For automated blocking, Mendel can be integrated with third-party systems like a NAC or Cisco ISE.


Policy violation: Improper traffic between management and user networks

Relevant for NIS2

Dedicated management segments are designed to limit who can interact with your infrastructure components like switches, routers, or servers. Unauthorized access from user networks increases the risk of misconfiguration, privilege abuse, or direct exploitation.

Validation with Mendel

Mendel’s peer graph provides you with a clear view of communication between your defined network segments. Your analysts can focus on management subnets to verify whether they are properly isolated from user networks, as required by internal policies.

For example, subnet 10.0.20.0/24 was assigned as a management zone, but Mendel revealed active connections to other internal networks.

After updating firewall rules, Mendel confirms isolation by showing no communication from 10.0.20.0/24.

Network Services Policy Enforcement

Core network services like DNS and DHCP are frequent targets for misuse or misconfiguration. Ensuring that only authorized services are active helps prevent spoofing, data leaks, and disruptions to your network stability.

Policy violation: Usage of unauthorized internal/​public DNS servers

Relevant for NIS2

This policy ensures that only approved DNS servers are used for resolving domain names inside the network. Unapproved or misconfigured servers can bypass security controls, hide malicious activity, or return forged responses.

Validation with Mendel

Internal DNS usage:  Mendel allows you to filter internal DNS servers using the host tag Role/​Server/​DNS. This provides you with a clear inventory of devices offering DNS or DNS-relay services. Your analysts can review this list and drill down into individual IPs to confirm whether each DNS server is expected and approved.

For example, a device at 192.168.178.1 was identified as providing DNS services. No other services were detected, indicating a possible relay or misconfigured gateway.

Public DNS usage: By filtering outbound DNS traffic, Mendel reveals which internal devices are using public DNS servers. This allows your analysts to identify whether DNS queries are leaving the network through unapproved resolvers.

In one case, two hosts were detected using Google DNS services: one being a default gateway, and another (192.168.40.215) a standard internal client. Such cases should be reviewed against DNS usage policies to ensure compliance.


Policy violation: Unauthorized DHCP Servers

Relevant for NIS2

This policy ensures that only approved DHCP servers operate in the network. Unauthorized DHCP servers can assign incorrect configurations, enable man-in-the-middle attacks, or disrupt connectivity.

Validation with Mendel

Mendel automatically detects new DHCP servers in your network and generates an event. In addition, it lists all DHCP servers by filtering hosts with the tag Role/​Server/​DHCP, helping your analysts verify whether each one is authorized or misconfigured. Drilling down on each IP reveals additional services and host behavior for deeper inspection.

For example, device 192.168.2.254 was found running multiple services, including DHCP, NTP, DNS, SSH, TELNET, and Mikrotik Winbox. This suggests it may be a router or a misconfigured network appliance.

From Visibility to Accountability

Enforcing internal rules only matters if those rules are visible and actionable. Without continuous policy monitoring, organizations like yours risk overlooking gaps that can lead to misconfigurations or downtime. Mendel helps you by aligning internal visibility with real-time behavior, enabling your teams to improve incident response, reduce alert fatigue, and maintain control over your environment.

In the next part, we’ll explore how Mendel validates encryption policies, user identity enforcement, and application-level restrictions, which are critical areas for maintaining compliance and reducing operational risk.

Want to evaluate your own network? Request a security audit with Mendel.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Gone but not forgotten: What to consider when managing leavers data archiving

 

Data is one of an organization’s most valuable assets. But if not managed correctly, it can also become a costly liability. With ever-evolving data protection laws and compliance requirements, businesses must find the right balance between retaining and deleting data. This is particularly crucial when managing data left behind by departing employees.

What is data archiving? 

Data archiving is the process of storing data for long-term preservation so that it can be accessed when needed. Typically, data, such as emails and files, is archived when an employee leaves the company.  The need to access archived data can arise due to reasons such as:

  • Compliance requirements
  • Legal requests
  • Historical reference

Organizations therefore need to keep their data for a certain period. But while archiving data ensures long-term accessibility, it also introduces challenges, particularly when it comes to compliance and security. Organizations must carefully manage the fine line between retaining essential records and deleting outdated data.

Why is data archiving a balancing act?

Striking the right balance between data retention and deletion is a challenge for IT and compliance teams. While businesses need to keep data for audits and legal requirements, retaining it indefinitely leads to security risks and unnecessary costs. To complicate matters, collaboration platforms like Google and Microsoft don’t always align with business needs: Google, for example, permanently deletes most data after 30 days, which may not be enough for compliance purposes.

Keeping data forever is not the answer

Not retaining data for long enough creates problems. The same is true for the opposite end of the spectrum – keeping data indefinitely. “Forgotten data” not only accumulates storage costs, it also increases an organization’s security and compliance risk. For example, an organization found to be in breach of HIPAA faces penalties of up to $68,000 per violation per year as well as civil lawsuits and criminal charges. Therefore it is important that data can be purged upon request and after a defined period of time.

Beyond regulatory fines, excessive data storage also increases exposure to cyber threats. In 2023 alone, data breaches cost businesses an average of $4.45 million per incident. Holding onto unnecessary data creates more entry points for hackers and complicates compliance with laws like GDPR, which mandate data minimization.

Why should you archive your business data?

1. To comply with legal requirements

Ensuring that leavers’ data is stored securely and so that it can be searched and restored is not only best practice, it is also a regulatory requirement in many legislations. 

Laws and directives such as GDPR, HIPAA, and NIS2 mandate that organizations retain certain types of data for predefined periods. Beyond retention, businesses must also ensure data is secure, accessible, and tamper-proof. Failing to meet these requirements can result in hefty fines, reputational damage and even legal action. 

2. To preserve institutional knowledge

Employees come and go, but their digital footprint often holds valuable insights. It is important for the smooth running of your organization that emails and files are stored securely and can be accessed as needed, even after an employee has left the organisation.

3. To streamline legal and regulatory audits

Compliance doesn’t stop at retention. Organizations must also produce records quickly during audits or legal proceedings. Tools like CloudM Archive offer advanced search functionality which enables you to locate specific data sets without combing through mountains of information.

4. To ensure data security and integrity

With features like immutable storage and role-based access controls, archiving tools provide an added layer of security. This is critical for demonstrating that archived data has not been altered or tampered with—a requirement in many compliance scenarios.

5. To achieve cost efficiency

Storing inactive user data on primary platforms can be expensive. 3rd party tools can offer a cost-effective alternative, freeing up valuable resources whilst ensuring compliance needs are met.

 

How can CloudM Archive help secure your data and save costs?

With CloudM Archive, you can take control of your data: retaining it securely when needed and deleting it when it’s no longer required. Whether you need to reduce storage costs, ensure compliance, or quickly access archived records, CloudM Archive makes the process effortless and efficient.

CloudM Archive enables you to:

  1. Reduce costs: CloudM Archive can help companies reduce costs by automatically removing or reassigning user licenses.
  2. Automate retention policies: CloudM Archive can help companies automate retention policies based on selected organisational units (OUs) or create bespoke retention policies based on specific requirements.
  3. Remain in control of your data: CloudM Archive can help companies host leavers’ archived data in their own storage, avoiding vendor lock-in.

 

Simplify compliance with CloudM Archive

Achieving compliance doesn’t have to be a daunting task. With CloudM Archive, organisations can strike the perfect balance between data retention, accessibility and cost-efficiency. Whether you’re preparing for an audit, navigating complex regulations or simply safeguarding your institutional knowledge, CloudM Archive ensures your data is “gone but not forgotten” while enabling you to delete it as and when required.

 

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CloudM
CloudM is an award-winning SaaS company whose humble beginnings in Manchester have grown into a global business in just a few short years.

Our team of tech-driven innovators have designed a SaaS data management platform for you to get the most from your digital workspace. Whether it’s Microsoft 365, Google Workspace or other SaaS applications, CloudM drives your business through a simple, easy-to-use interface, helping you to work smarter, not harder.

By automating time-consuming tasks like IT admin, onboarding & offboarding, archiving and migrations, the CloudM platform takes care of the day-to-day, allowing you to focus on the big picture.

With over 35,000 customers including the likes of Spotify, Netflix and Uber, our all-in-one platform is putting office life on auto-pilot, saving you time, stress and money.

ESET will discontinue ESET Parental Control for Android