Skip to content

ESET Announces Integration with Arctic Wolf to Deliver Next-Gen Detection and Response for Businesses

  • ESET Inspect has been integrated into Arctic Wolf’s Managed Detection and Response solution to provide proactive defense via their cloud-native platform and human expertise
  • Arctic Wolf customers will gain access to real-time global telemetry, detailed reports and actionable insights that arm them against more diverse and sophisticated attacks
  • The integration marks an important milestone for ESET as it expands its integrations platform and collaborates with best-in-class technology companies 

BRATISLAVAApril 24, 2024ESET, a global leader in next-gen digital security for business, today announced a new integration with Arctic Wolf, a global leader in security operations, to ensure increased visibility and protection against modern threats. By integrating ESET Inspect into Arctic Wolf’s Security Operations Platform, Arctic Wolf customers are able to enhance their security posture – aggregating vast amounts of data from diverse, global sources.

“Businesses today and the channel community are demanding technology ecosystems that simplify cybersecurity management, offer complete visibility across a variety of attack surfaces, and bring industry leaders together under one architecture,” said Trent Matchett, Director of Direct Channel
Global Sales at ESET. “We have invested significantly in the ESET PROTECT Platform and an open API gateway to empower an impressive catalogue of integration partners moving forward. Arctic Wolf is one of the most trusted MDR vendors in the world, and an exciting milestone for our integrations program.”

Arctic Wolf helps organizations end cyber risk by providing a cloud-native security operations platform, with solutions that include Managed Detection and Response, Managed Risk, Managed Security Awareness, and Incident Responses, each delivered through the industry-pioneering Concierge Delivery Model. Arctic Wolf’s Concierge Delivery Model provides tailored risk mitigation guidance and security insights based on the telemetry of the customer’s tech stack, like ESET Inspect, to keep an organization’s environment safe.

“Arctic Wolf and ESET share the common belief that embracing openness and interoperability are essential for helping to deliver the positive cybersecurity outcomes that organizations demand,” said Ian McShane, VP of Managed Detection and Response at Arctic Wolf.  “The new ESET PROTECT Platform API allows ESET Inspect data to seamlessly integrate with the Arctic Wolf Platform, that when combined with the telemetry from other security tools, ensure Arctic Wolf customers get holistic protection against an ever-evolving threat landscape.”

As a result of this integration, Arctic Wolf customers will gain access to:

  • Real-time Incident Response, including Post-Incident Analysis and Remediation:
    ESET Inspect will enable the detection of suspicious activity on a client’s endpoint, sending alerts to Arctic Wolf, who can then conduct a security investigation, confirming the threat and then employing immediate response followed by an analysis of the acquired data to assess the damage and prepare for future threats.
  • Regulatory Compliance:
    Because clients must comply with several regulatory standards that can require detailed logs of all activity on their endpoints, ESET Inspect will provide these logs so that Arctic Wolf can help their customers ensure compliance.
  • Managed Security for Resource Constrained Organizations :
    Many organizations often lack the resources to house internal security teams, so they contract an outside partner like Arctic Wolf to assist with their cyber defenses. Thanks to ESET Inspect and its data, Arctic Wolf customers will be better equipped to provide a high level of security to organizations of almost any size without them having to hire and train their own security personnel.

ESET Inspect acts as the XDR-enabling module of the ESET PROTECT platform, delivering breach prevention, enhanced visibility and remediation. ESET Inspect is a comprehensive detection and response with rich features such as: incident detection, incident management and response, data collection, indicators of compromise detection, anomaly detection, behavior detection and policy violations. For more information on ESET Inspect, visit here.

For more information on ESET’s investment on API integrations and opportunities to partner, visit here.

Find more information about how Arctic Wolf can help organizations end cyber risk here.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Optimize your healthcare IT operations – Key strategies for success

As an IT professional in healthcare, you are at the frontline of managing systems that are critical to patient care. This summary highlights actionable strategies to tackle common challenges:

  • Modernizing legacy systems: Move away from outdated technologies that compromise efficiency and security. Planning a strategic upgrade path is essential for staying current and secure.
  • Strengthening cybersecurity: Protect sensitive patient data with robust security measures such as network segmentation and two-factor authentication (2FA). Adherence to cybersecurity frameworks like HICP and NIST is crucial.
  • Manage budgets smartly: Innovate within financial constraints. Prioritize investments that enhance operational efficiency and patient care without breaking the bank.

Practical strategies to boost your IT operations

  • Tool consolidation: Simplify your tech stack by consolidating tools and systems. This reduces complexity and operational costs while improving data integrity.
  • Embracing automation and AI: Leverage the latest in AI and automation to reduce manual tasks, allowing your team to focus on higher-value activities.

Enhancing cybersecurity practices

Proactive measures are your best defense against cyber threats:

  • Implement strong security protocols: Regular updates, rigorous employee training, and a solid disaster recovery plan are non-negotiable to safeguard against data breaches.
  • Continuous education and vigilance: Keep your team updated with the latest security practices and threat intelligence to stay ahead of potential risks.

Balancing cost and innovation

Efficient budget management enables innovation even with financial limitations:

  • Exploring cost-effective technologies: Utilize scalable solutions that provide high ROI. Regularly review and adjust your technology investments based on performance and necessity.
  • Invest in your team: Attracting and retaining skilled professionals is vital. Provide ongoing training and competitive benefits to enhance staff retention and satisfaction.

Unlock the full insights and learn how to put them into action

Download our ebook now to take a deep dive into these game-changing tips, and explore how Atera’s AI-powered IT management platform is the key to reinventing your IT operation and driving success.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Atera
Small and medium IT operators are the heroes behind the scenes supporting companies around the world. They care a lot for their clients (external or internal) and often work virtually 24/7. However, small and medium IT service providers have always been underserved.
Atera was built for exactly that. With the vision to simplify and streamline the work of Managed Service Providers and IT professionals. To create something that saves them time, energy, and money. To free them from needing to constantly put out fires.
That vision created the remote-first IT management software – enabling IT professionals to shift from reactive task takers to proactive problem solvers.
Now operating from our beautiful offices on Rothchild in Tel Aviv, Atera is currently used by thousands and thousands of IT professionals all over the world (105+ countries).
As we rapidly grow, our goal remains the same: to transform the IT industry with revolutionary technology, while creating one of the happiest and healthiest work environments in the world.

A Brief Look at the Cyber Risk Institute’s Profile Version 2.0

The pressures on financial cybersecurity programs to maintain pace with both threats and regulatory changes is perhaps second to none (well, maybe the healthcare industry). Recognizing this, the Cyber Risk Institute (CRI) has recently unveiled Version 2.0 of its Cybersecurity Profile (CRI Profile), marking a significant step forward in the standardization and strengthening of cybersecurity measures across the financial sector.

The Evolution to Version 2.0 

Originally developed as a comprehensive framework tailored to the financial industry, the CRI Profile harmonizes a myriad of regulatory requirements into a single, streamlined set of guidelines. Its latest iteration, Version 2.0, builds on this foundation with extensive updates that reflect the latest cybersecurity trends and regulatory insights. The CRI, a not-for-profit coalition of financial institutions and trade associations, has engineered these changes to foster a more resilient financial infrastructure globally.

What’s New in Version 2.0?

The CRI Profile Version 2.0 introduces several key enhancements aimed at increasing its usability and effectiveness for financial institutions navigating the complex landscape of cybersecurity threats and regulatory pressures.

Enhanced Clarity and Usability

The new version has refined its control objectives and diagnostic statements, making them clearer and more actionable. This change helps institutions of all sizes more effectively implement the necessary cybersecurity measures and ensures that the guidelines are accessible to a broader range of professionals within the industry.

Expanded Coverage of Emerging Threats

Recognizing the dynamic nature of cyber threats, Version 2.0 includes updated guidelines that address recent security challenges, such as ransomware and supply chain attacks. These updates are critical as financial institutions increasingly rely on digital technologies that expose them to new vulnerabilities.

Streamlined Compliance

One of the standout features of the CRI Profile has always been its ability to simplify compliance by integrating various regulatory expectations into a single framework. Version 2.0 takes this further by enhancing the alignment with global standards such as ISO and NIST, thus reducing the compliance burden on institutions and allowing them to focus more on fortifying their defenses.

Focus on Cloud Security

With the financial sector’s growing dependence on cloud technologies, the new Profile version places a significant emphasis on cloud security. It provides detailed guidance on managing relationships with cloud service providers (CSPs) and ensuring that security measures are robust throughout the lifecycle of cloud services.

Benefits of Adopting CRI Profile Version 2.0

The adoption of the CRI Profile Version 2.0 offers numerous benefits for financial institutions:

  • Reduced Regulatory Complexity: By consolidating and clarifying regulatory expectations, the Profile simplifies the compliance landscape, making it easier for institutions to meet their obligations without excessive administrative burden.
  • Enhanced Cyber Resilience: The Profile’s comprehensive approach to cybersecurity, encompassing current threats and best practices, helps institutions strengthen their defenses against a broad spectrum of cyber risks.
  • Streamlined Communication: The common framework and language provided by the Profile facilitate clearer communication about cybersecurity expectations and practices between financial institutions and their regulators, partners, and service providers.
  • Cost Efficiency: By reducing redundancy in compliance efforts and focusing on effective risk management practices, institutions can optimize their cybersecurity investments and achieve better outcomes with fewer resources.

Looking Forward

The CRI’s continuous efforts to update and refine the Cybersecurity Profile underscore its commitment to keeping the financial sector secure and compliant in an age of digital transformation. As cyber threats evolve and new technologies emerge, the Profile serves as a living document, adapting to meet the needs of the industry. For financial institutions, embracing the CRI Profile Version 2.0 represents not just compliance, but a strategic advantage in the ongoing effort to protect their operations and customer data from cyber threats. As we look to the future, the role of standardized frameworks like the CRI Profile in promoting cybersecurity resilience cannot be overstated.

With its latest update, the CRI Profile continues to set the standard for cybersecurity in the financial sector. Version 2.0 of the Profile is a testament to the industry’s collective commitment to advancing cybersecurity standards and practices. For institutions ready to take their cybersecurity to the next level, the CRI Profile Version 2.0 offers a robust, tested, and comprehensive toolkit for achieving cyber resilience and regulatory compliance.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Portnox and Bugcrowd to Launch Private Bug Bounty Program to Provide Best-In-Class Unified Access Control

Austin, TX – April 23, 2024 – Portnox, a leading provider of cloud-native, zero trust access control solutions, today announced it will soon launch a private bug bounty program with Bugcrowd, the leader in crowdsourced security. The Portnox bug bounty program will offer a bounty for ethical hackers, also known as “white hat hackers,” to uncover and report software security vulnerabilities within Portnox’s production services. Bugcrowd will manage the submission and reward process, which is designed to ensure a streamlined experience for all participants. 

“This bug bounty program is part of our ongoing efforts to ensure that we provide customers with best-in-class security for their enterprise networks and applications,” said Denny LeCompte, CEO of Portnox. “Bugcrowd helps close the gap between security and development, so that we can continue to safely innovate.”

Participants can earn a range of payments, depending on the criticality of the submitted vulnerability. Ethical hackers that are already active on Bugcrowd are invited to participate in private bug bounty programs once they become active on the platform through hacking public bug bounties. Companies that currently participate in public bug bounty programs with Bugcrowd include Atlassian, ExpressVPN, Rapyd, T-Mobile, USAA, Viator, and more.

While aspects of hacking are being automated, and threat actors are using generative AI to increase the speed and number of enterprise attacks, the good guys have the same access to this technology. According to a 2023 Bugcrowd research report, 94% of ethical hackers plan to start using AI. By continuing to empower hackers on crowdsourced security platforms, Portnox starts to level the playing field, ultimately helping organizations keep their systems and data secure.

“Crowdsourced security provides companies like Portnox with an army of allies to take back control and outpace threat actors,” said Dave Gerry, CEO of Bugcrowd. “We are happy to work with Portnox to ensure that their customers have every reassurance that they are taking an aggressive and proactive approach to securing all potential attack surfaces.”.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

After the Click: The Inner Workings of Application Access

After the Click: The Inner Workings of Application Access

From social media and cloud-based services to anything and everything requiring an app, we spend a lot of time logging into applications. Have you ever stopped to wonder what happens after you click that login button? The inner workings of application access involve a complex interplay of authentication, authorization, APIs (application programming interfaces), security measures, and network conditions. Let’s take a closer look at what happens behind the scenes after the click.

The Initial Handshake – Understanding Authentication

The journey into an application begins with a crucial step known as authentication. This process is fundamentally about ensuring you are who you claim to be. A variety of methods can be employed for this purpose, each offering various levels of security and user convenience. Passwords, though widely used, represent just the tip of the iceberg. In recent years, more secure and sophisticated options like biometric verification — think fingerprint or facial recognition — have gained popularity. As it has become evident that passwords are not particularly secure, extra measures like multi-factor authentication and certificate-based authentication have become commonplace.  A digital handshake occurs between the user and the application upon successful authentication, establishing a trust relationship. This moment is critical; its where digital doors open, allowing access into the application’s ecosystem. However, it’s important to understand that this step doesn’t determine what you can do or see within the app. That’s governed by a subsequent process known as authorization.

Authorization and Access Control

Following successful authentication, the user’s journey within an application transitions to a critical phase known as authorization. This stage is instrumental in defining the scope of the user’s privileges and interactions within the app. Unlike authentication, which verifies identity, authorization delves into the specifics of what authenticated users are permitted to do. For instance, in a corporate setting, all employees can log onto the network, but only certain employees can see data specific to HR or Finance. This is known as role-based access control, a key part of zero trust where each employee has access only to what they need to do their job in order to defend against both external threats and potential internal misuse. This not only enhances the security posture of the application but also tailors the user experience by filtering accessible content and functionalities to meet the user’s needs and privileges. In essence, authorization acts as a sophisticated filter, carefully curating the user’s access to ensure it aligns with their rights and the organization’s policies, thereby maintaining the integrity and confidentiality of the application’s resources.

The Role of APIs in Application Access

APIs, or Application Programming Interfaces, are the unsung heroes of digital connectivity, seamlessly bridging the gap between disparate software systems. They serve as the essential conduits for data exchange, enabling your device to communicate with an application’s backend servers. Think of APIs as the linguistic experts of the digital world, translating requests and responses between your device and the app in a language they both can understand. This linguistic dexterity allows for the dynamic delivery of content and functionality, making your interactions with the app smooth and efficient.  In the context of application access, APIs are critical for executing a myriad of tasks behind the scenes. From the moment you authenticate, APIs are at work, fetching your profile information and preferences and customizing your in-app experience based on your permissions. They facilitate real-time data synchronization, ensuring the information you see is current and accurate. Additionally, APIs enable third-party integrations, allowing apps to offer enhanced features and capabilities by leveraging external services and data.  Moreover, APIs are pivotal in maintaining the security of the application access process. They enforce strict data access protocols, ensuring that only authenticated and authorized requests are processed. This layer of security is crucial in protecting sensitive user information and preventing unauthorized access to the application.

Ensuring Security Throughout the Access Process

When it comes to application access, safeguarding against threats and vulnerabilities is a top priority for developers and IT professionals alike. Integral to maintaining this security are state-of-the-art encryption methods, which play a crucial role in protecting data as it travels across the internet. Encryption ensures that even if data is intercepted, it remains indecipherable to unauthorized parties.   To further bolster security, conditional access products are implemented to enforce security policies that prevent potentially compromised devices from gaining access. These systems are vital in identifying potential threats, allowing immediate action to mitigate risks.  Equally important is the process of rolling out timely updates and patches. This not only addresses known security flaws but also adapts to the continually evolving landscape of cyber threats. By staying ahead with these updates, applications can shield themselves against the latest exploits and attack vectors.  Together, these multifaceted security measures form a comprehensive approach to protecting the integrity of application access. Through diligent implementation and ongoing vigilance, developers and security teams work hand in hand to create a secure environment for users to connect and interact with applications.

The Impact of Network Conditions on Application Access

The quality of network connectivity is pivotal in determining the efficacy of accessing applications. Variabilities such as bandwidth availability, latency levels, and overall network congestion can significantly influence the ease with which users can connect to and interact with apps. Poor network connections can lead to frustrations like slow loading times, interrupted sessions, or even the inability to access certain functionalities within the application.  To address these challenges, developers implement various strategies aimed at optimizing the user experience under diverse network conditions. Techniques such as load balancing are utilized to distribute incoming application traffic across multiple servers, thereby preventing any single server from becoming a bottleneck. Content caching is another critical strategy, where frequently accessed data is temporarily stored closer to the user, reducing the need to fetch data from the application’s primary servers and thus speeding up access times. Additionally, network optimization efforts focus on streamlining data transmission paths and protocols to ensure efficient data flow even in less-than-ideal network environments.  These efforts are essential in ensuring that application access remains robust and user-centric, minimizing the impact of fluctuating network conditions on the overall digital experience. By proactively addressing these challenges, developers can ensure that applications remain accessible and performant, regardless of the underlying network state.

The Future of Application Access – Trends and Innovations

The trajectory of application access is being significantly influenced by emerging trends and technological breakthroughs. Among the most noteworthy is the shift towards Zero Trust security models, which assume no entity is trustworthy by default, whether inside or outside the network, dramatically altering traditional access paradigms. A key part of Zero Trust is the push towards passwordless authentication, which provides security beyond the simple password and even beyond multi-factor authentication methods which are increasingly falling prey to sophisticated hacks (and less sophisticated but no less effective social engineering techniques.)  Artificial intelligence and machine learning are playing increasingly crucial roles, enabling more personalized and adaptive access experiences. These technologies enhance security and make application access more intuitive and responsive to user behavior and environmental contexts.  As these trends converge, they herald a new era of application access, characterized by heightened security, improved efficiency, and a more seamless user experience. The ongoing innovations in this space promise to redefine our digital interactions, making the way we connect to applications more secure, efficient, and tailored to individual needs.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

10 best VPN books to update your online privacy knowledge

This is the age of the Virtual Private Network (VPN). More than 1.5 billion people worldwide rely on VPNs, and organizations of every type routinely use Virtual Private Networks to protect their privacy. 

Those statistics aren’t surprising. Using the internet would be much more dangerous without the protection offered by VPNs.

What is a VPN?

VPNs use encryption to create tunnels between digital locations. They shield information from external attackers, cutting the risk of data breaches. They allow streamers to work around geo-blockers, and they guard individual liberty against surveillance states.

However, VPN solutions come in many varieties, and effective privacy systems adapt to different network architectures or data flows. Integrating VPNs into your setup requires in-depth knowledge of the latest techniques.

If that sounds daunting, help is at hand. The digital privacy community hosts many articulate writers with in-depth VPN and general privacy knowledge. We’ve selected the best VPN books from 2024’s crop. Check out a few titles to boost your VPN awareness and find the perfect privacy solution.

Top 10 VPN books

  • The Art of Invisibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

  • Extreme Privacy: What It Takes to Disappear in America

  • CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide

  • Build Your Own VPN Server: A Step-by-Step Guide

  • Business VPNs: Digital Privacy for Businesses and Teams

  • Network Security Assessment 3e: Know Your Network

  • Implementing Always On VPN: Modern Mobility with Microsoft Windows 10 and Windows Server 2022

  • Zero Trust Security: An Enterprise Guide

  • Beginner’s Introduction To Privacy

  • The Watchman Guide to Privacy: Reclaim Your Digital, Financial, and Lifestyle Freedom

The Art of Invisibility

The best VPN books The Art of InvisibilityNobody understands privacy threats like an experienced hacker. Luckily, a few people have crossed over from the dark side to share their experiences.

Kevin Mitnick (who sadly passed away in 2023) was once enemy number one for the cybersecurity authorities. Years of breaching government and corporate networks gave him insider knowledge that few people can match.

Before he died, Mitnick left this fascinating book about what digital freedom means and how we can protect it. Mitnick shows the limitations of traditional security tools like firewalls and anti-virus scanners. Insider tips about evading hackers and clear-eyed analysis of digital surveillance make this a must-read for VPN users.

Extreme Privacy: What It Takes to Disappear in America

Michael Bazzell makes a living helping celebrities to avoid data breaches and unwanted disclosures. This background makes him well-placed to advise the general public about how to protect online privacy.

“Extreme Privacy” works well because Bazzell outlines a comprehensive blueprint for designing privacy solutions. Bazzell wrote the book with individuals in mind. However, businesses will also benefit from his experience and ideas.

CCNP Security Virtual Private Networks SVPN 300-730

Moving on to something more technical, this standard guide provides everything candidates need to know when seeking a Cisco VPN certificate. The guide also includes quizzes and sample tests to prepare readers, and the three authors are all seasoned Cisco experts.

Cisco serves around 50% of business VPN service users in the United States, and certification proves that organizations understand how to build secure electronic systems. However, the expertise included in this textbook makes it a valuable read for all VPN engineers.

Build Your Own VPN Server: A Step-by-Step Guide

The best VPN books Build Your Own VPN Server

Building a VPN server is a tricky task. One configuration mistake can expose an entire network. Lin Song’s guide to open-source servers is the perfect starting point for companies developing independent privacy infrastructure.

Step-by-step instructions lead readers through configuration procedures for popular VPN protocols. Song covers Wireguard, IPSec, and OpenVPN. He also pitches advice at all major operating systems, always using accessible language.

Business VPNs: Digital Privacy for Businesses and Teams

The best VPN books Business VPNs

Gargiulo and Myers have helped hundreds of businesses implement site-to-site and single-site VPN coverage. This concise guide summarizes their expertise, providing practical ways to balance privacy and business efficiency.

“Business VPNs” will help companies select VPN solutions that suit their networks. However, it goes further than that, offering case studies about managing and maintaining VPNs to block malicious threats. Guidance covers access management, deploying firewalls, and secure configuration policies. Every section connects with everyday business users via case studies and real-world tips.

Network Security Assessment 3e: Know Your Network

This classic from O’Reilly explains how to carry out aggressive secure electronic network testing, including assessments of VPN protection. McNab’s textbook defines network testing best practices, with sections for email servers, VPN protocols, general network protocols, and operating systems.

Note: This book has various editions. The most recent was published in 2016 and is much more useful than earlier versions.

Implementing Always On VPN

The best VPN books Implementing Always On VPN

Microsoft’s Always On VPN is a popular way to secure cloud assets, protect remote devices, and integrate security systems with Active Directory. However, setting up an enterprise-wide Always On VPN can be tricky.

Richard Hicks cuts through the complexity, explaining VPN basics and core Always On features. If you want to connect VPN coverage to Azure deployments, his guide will show the way.

Zero Trust Security: An Enterprise Guide

Zero Trust is a critical security concept that treats all network users with suspicion unless they can supply proper credentials. VPNs play a central role in Zero Trust architecture by concealing sensitive data behind a wall of encryption.

This explainer covers more than just virtual private networks. Garbis and Chapman discuss firewalls, access management, public key infrastructure, and intrusion detection systems. The authors cover every component of Zero Trust network security.

However, we’ve included it in our VPN books list because the Zero Trust framework enables companies to make their VPNs more effective. And if you are interested in privacy, Zero Trust is something you need to know about — making this an essential read.

Beginner’s Introduction To Privacy

Sometimes, it helps to take a step back from VPN technology and assess the general privacy landscape. Brockwell’s short guide to privacy does just that. She explores what privacy means in the digital world and how we can protect our data against malicious threats.

Don’t expect in-depth technical specifications or excessive jargon. The strength of this book is how Brockwell makes complex ideas accessible and readable. It’s the ideal volume to skim through to remind yourself why privacy matters so much.

The Watchman Guide to Privacy

Better known as “the Watchman” in the privacy podcast world, Gabriel Custodiet is among the most creative privacy commentators. This general guide acts as a manual for modern businesses and individuals as they secure network assets against an endless stream of threats and snoopers.

While Custodiet ranges well beyond VPNs, digital privacy is his core focus. The book features plenty of nuggets of information about how to use encryption and choose the right VPN services. And the rest of the book is crammed with eye-opening material, from smartphone security to protecting financial assets.

Go beyond books to expand your VPN learning horizon

Books are indispensable tools to access knowledge and learn new skills. The publications above offer real-world advice and technical guidance for many critical VPN challenges. However, they aren’t the last word in building cybersecurity expertise.

The digital world offers security teams plenty of additional routes to VPN mastery. Wise organizations leverage as many information sources as possible to stay informed about security developments.

For example, VPN companies are often keen to provide information to potential customers. They realize that privacy protection is a grey area for many non-specialists. Educating customers helps them grow their client base while encouraging safer online behavior.

Some companies maintain learning centers that collate expert guidance in an easily searchable format. The NordLayer Learning Center is a great example, covering vast ground across every conceivable security topic.

Privacy podcasts provide regular updates from the coal face. Check out the IEEE’s Digital Privacy Podcasts for expert perspectives. Bookmark CPO Magazine as well for executive-level privacy insights and product reviews.

Sometimes, despite all the reading in the world, expert assistance is the only solution. NordLayer can help you navigate the complexities of VPN configuration. Explore Business VPN solutions that combine watertight security with flexible access and efficient performance. Get in touch with our team to discover more.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

The Cisco Duo MFA Breach: What We Know

Understanding the Cisco Duo MFA Breach

On April 1, 2024, a significant security breach was reported by Cisco, impacting its Duo multi-factor authentication (MFA) service. The Cisco Duo MFA breach occurred through a third-party telephony provider that manages SMS and VOIP services for Cisco Duo. A successful phishing attack enabled hackers to obtain employee credentials at the telephony provider, which were then used to access systems and download MFA SMS message logs. These logs contained metadata such as phone numbers, carriers, and geographical locations, though it’s crucial to note that the content of the messages was not accessed​​.

The Scope and Response

The Cisco Duo MFA breach specifically involved the logs of messages sent between March 1, 2024, and March 31, 2024. While the actual content of the MFA messages was secure, the metadata contained within could potentially be exploited for further targeted phishing campaigns or to facilitate other forms of social engineering attacks​​.

Upon discovering the breach, the affected telephony provider took prompt measures to contain the incident. This included invalidating the compromised credentials and enhancing security protocols to prevent future breaches. Cisco has been transparent with its customers, advising them to be vigilant and to educate their users on the risks associated with social engineering​.

Common Vulnerabilities in MFA Systems

While MFA is a robust security measure, the Cisco Duo incident highlights some vulnerabilities inherent in MFA systems, particularly those relying on telecommunication-based methods such as SMS and VOIP:

  1. Phishing Attacks: As seen in the Cisco Duo breach, phishing remains a significant threat. Attackers can use sophisticated tactics to trick individuals into providing access credentials.
  2. Social Engineering: Access to metadata from MFA systems can aid attackers in crafting more credible phishing attempts and other social engineering strategies.
  3. MFA Fatigue: Attackers may repeatedly request MFA codes to wear down a user’s resistance, eventually leading them to share a code inadvertently.
  4. SIM Swapping: This involves an attacker convincing a mobile provider to switch a victim’s phone number to a SIM card they control, intercepting MFA codes sent via SMS.
  5. Technical Flaws and Exploits: Vulnerabilities in the software or hardware used for MFA can allow attackers to bypass security measures. For example, exploiting network-level vulnerabilities to intercept or redirect MFA messages.

Enhancing MFA Security

To mitigate these vulnerabilities, organizations can adopt several strategies:

  • Layered Security: Combine MFA with other security measures like digital certificates, hardware security keys, or behavioral analytics to reduce reliance on any single security mechanism.
  • Educating Users: Regular training sessions can help users recognize phishing attempts and other forms of social engineering.
  • Using More Secure MFA Methods: Prefer push notifications or use hardware tokens instead of SMS-based MFA, which are less susceptible to interception.
  • Regular Audits and Updates: Keeping security systems updated and conducting regular security audits to identify and mitigate potential vulnerabilities.

The Cisco Duo MFA breach serves as a potent reminder of the ever-evolving landscape of cybersecurity threats. While MFA adds a critical layer of security, it is not infallible. Organizations must continuously evaluate their security practices and educate their users to safeguard against sophisticated cyber threats.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Best practices for achieving cybersecurity visibility in hybrid work environments

Network visibility reveals network usage patterns, enhancing security awareness. Visibility is a critical part of secure hybrid work environments where new devices come online constantly, and workers can connect from almost anywhere.

This article explains why network visibility matters in a remote and hybrid work context. We will explore the meaning of visibility and offer practical suggestions about how to discover network traffic and user activity on your network.

Why is visibility important in cybersecurity?

Visibility allows security teams to identify and monitor network connections. Good network visibility verifies the status of endpoints and inspects network traffic for threat detection and performance management.

Problems arise when engineers lack reliable visibility. Low visibility puts digital assets at risk. Malware and malicious users can infiltrate the network edge, resulting in data breaches or network attacks. Monitoring user activity is also more challenging in chaotic low visibility environments. Companies struggle to monitor data usage, creating compliance risks.

IT teams lack knowledge about traffic flows, network connections, user communities – and general performance. Troubleshooting and maintenance become very challenging.

Unfortunately, achieving cybersecurity visibility is not simple. Cloud devices and encryption create hard-to-inspect blind spots. Visibility tools may not monitor certain traffic types. Network complexity rises over time, out-pacing the ability to visualize network architecture.

Above all, remote connections can overwhelm security teams. Hybrid and remote work environments quickly become unmanageable, creating unguarded endpoints.

Cybersecurity challenges in hybrid work environments

Ensuring visibility is critical in remote or hybrid work setups. When workers leave the office, their workstations and data travel with them. Engineers must monitor every endpoint, even in remote work offices.

Visibility is hard to achieve, but the cybersecurity factors below make it essential.

  • Remote workforces expand the attack surface. Workers use many devices in different locations. They move between offices, homes, and public networks. There are more entry points for malicious actors. The risk of attacks rises.

  • Remote devices are vulnerable to network attacks. Laptops and smartphones might lack up-to-date virus protection or VPN coverage. Thieves can steal devices and extract valuable data.

  • Remote work presents opportunities for insider threats. Security teams may be unable to monitor user access. They cannot know who is viewing confidential data.

  • Collaboration tools used by remote workers also present vulnerabilities. Apps like Slack and Google Docs can expose sensitive data. Phishers can gain access via a single link.

Best practices for achieving cybersecurity visibility in hybrid work environments

Remote access comes with security risks. However, companies have many reasons to embrace home or hybrid work. Balancing flexible work and cybersecurity is critical. Follow these best practices to blend convenience and cybersecurity visibility.

Cybersecurity visibility best practices for hybrid work

Implement network monitoring

Cybersecurity visibility begins with remote network monitoring. Monitoring tools place remote agents on employee devices. Agents track network traffic, logging the files employees access, when they do so, and information like device profiles and locations.

Monitoring can raise privacy concerns if agents extend to non-work activities. Solve this issue by enforcing policies that stop workers from using the same laptop for work and leisure.

Engineers can also limit monitoring to relevant web apps and prevent the extraction of critical data. Everyday user activity remains private, but IT staff can still mitigate cybersecurity risks.

Establish clear and comprehensive cybersecurity policies

Secure remote work relies on robust cybersecurity policies. Policies create a framework for remote connections to central assets, establishing best practices and expectations.

Focus policies on critical remote work areas. For example, policies must cover password management, using antivirus tools and encryption, multi-factor authentication (MFA), and communicating with colleagues securely.

Explain what you expect from employees. Define what it means to connect or handle data safely. Reinforce expectations with regular employee training. Don’t allow anyone to set up a home office without thorough preparation.

Strengthen endpoint security

Endpoint security is a core challenge when ensuring remote work visibility. Every laptop or employee’s smartphone could be a vector for cybersecurity threats. Your security posture should cover every endpoint—wherever employees choose to work.

Require employees to use approved antivirus and anti-malware tools. Centralize patch management to ensure updates reach every device. Centralized delivery eliminates human error. Standardized protection covers all remote devices.

Use secure tools to establish remote connections. Business Virtual Private Networks (VPNs) help encrypt traffic flows and conceal business data from outsiders.

Endpoint Detection and Response (EDR) is another option. EDR tools provide threat visibility by monitoring endpoints for suspicious activity or vulnerabilities. EDR enables a proactive approach, countering weaknesses before threats to critical infrastructure emerge.

Embrace cloud-native security solutions

Using cloud services is often the best way to secure remote workers. Cloud tools do not rely on centralized network management or installing apps on user devices. Security tools reside on the cloud, traveling with employees.

Workers log on to company assets via Single Sign On (SSO) or Secure Web Gateways (SWGs). Cloud-native VPNs and network monitoring systems secure data flows when users access cloud services.

Cloud-native solutions make it easier to achieve cybersecurity visibility. Security teams can track cloud app usage, check for suspicious connections, and block access to sensitive cloud resources.

Embrace the Zero Trust security model

The Zero Trust model teaches network managers to “never trust, always verify.” This is a sound strategy for securing remote workers and ensuring cybersecurity visibility.

Basing network security on Zero Trust solutions. Robust access management tools verify identities and user permissions. Network segmentation and encryption keep critical infrastructure off limits without a business justification.

Continuous authentication also avoids complacency. Malicious actors gaining access during remote work sessions can’t get far without proving their identities. Zero Trust requires a vigilant, proactive security posture. Security teams assume that users represent cybersecurity threats unless they can prove otherwise – a stance that makes perfect sense when securing fluid remote work environments.

Strengthen access control

Access controls are a crucial component of Zero Trust approaches and a must-have for remote work visibility. Managing access promotes visibility by establishing the identities of network users. Security teams know which users are connected and their level of privileges. If users breach their privileges, systems deny access and generate alerts.

Customizing access policies using role-based access controls (RBAC) is advisable. RBAC streamlines access, mapping permissions onto employee roles. This enhances security without hindering business operations.

Provide security awareness training for remote employees

Remote work security is a human and technical challenge. Companies can only ensure cybersecurity visibility in remote work environments by providing regular employee training.

Training programs should cover critical remote work themes, including:

  • Password management and authentication using and updating security tools such as VPNs and anti-malware apps

  • Secure data handling and collaboration

  • Phishing awareness and physical device security

  • Incident response. How and when to inform security teams about threats or accidents.

How NordLayer can secure your hybrid workforce

Embracing remote work should never compromise cybersecurity. Realize the benefits of flexible working arrangements by ensuring cybersecurity visibility and creating secure remote work environments.

Building secure remote work systems from scratch is complex and time-consuming. Achieve better results (and save a lot of stress) by partnering with NordLayer’s network visibility solutions.

Our solutions make traffic visible and easy to analyze. Device Posture Monitoring verifies devices and ensures compliance with security policies. Usage Analytics helps you manage loads and optimize performance, while activity monitoring tracks member IDs and user behavior.

NordLayer’s tools put businesses in control of distributed networks. Security teams know who is connected and how they interact with network assets. To find out more, get in touch with our team today.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

How Linux (Almost) Had a Terrible, Horrible, No Good, Very Bad Day

How Linux (Almost) Had a Terrible, Horrible, No Good, Very Bad Day

If there’s one thing you can say about the people behind the xz supply chain hack, they were certainly willing to play a long con.    For the last two years, a (probable) state-sponsored hacker quietly began integrating themselves into the open source community, particularly with the people responsible for maintaining xz utils (more on what this is and what it does in a minute.)  They began systematically inserting a back door into this core component of the Linux operating system that would have allowed attackers to bypass SSH authentication and remotely access millions of systems.  We were just days away from the biggest supply chain attack in history when they were caught.

What is XZ Utils?

Xz Utils is a program that handles file compression, and it is included as part of several popular Linux distros like Fedora, Debian, and Ubuntu.  There is even a Windows version, although Windows software is usually a zip file rather than an xz file.    Programs like this are crucial because large downloads like software packages need to be compressed, or they would take forever to download even with the highest internet speed.

 

Open Source, Open to All

To understand how we came so close to disaster, you first have to understand how open source software works.  Open source means that the source code – the building blocks of the software – is available for anyone to see and modify.   Open source software is like buying a box of legos – sure, you can make the robot on the outside of the box, but you can also modify and invent whatever you want.  The same applies to open source software – if you have the requisite programming knowledge, you can contribute bug fixes, work on features, and shape the future of the programs you use every day.  Software like Microsoft Windows and macOS are closed source (although macOS runs on FreeBSD, which is open source, but the user interface and applications are closed source.) With these operating systems, you’re at the mercy of Microsoft and Apple to fix bugs, and as we all know, they often don’t (just take a look at this 40+-year-old bug someone found in Windows in 2018!)  The huge advantage of using an open source OS like Linux is that if you have a bug or a feature request that you want to be implemented, you can just do it yourself.    Of course, just because anyone can technically contribute, does not mean there is just software anarchy.  According to The Linux Foundation, most projects have a structure:

  • Leaders
  • Someone responsible for making the final decisions about features, releases, and other priorities
  • Maintainers
  • These people are leaders for specific areas or features; for instance, there is a documentation leader, a leader for developing device drivers, USB, etc. etc.  They are responsible for reviewing code from others before it gets added to their individual area.
  • Committers
  • Trusted developers who have done enough work for the project that they can make direct code changes rather than be subject to reviews by the maintainers.
  • Contributors
  • Anyone who contributes, be it code, documentation, or what have you.  Their contributions are reviewed by the maintainer(s) before they’re added to the project.

 

Foxes in the Hen House

In 2021, someone with the user name JiaT75 opened a GitHub account and made their first commit to an open source project.  They claimed it was just adding clearer error text when an untaring (aka uncompressing) process failed; at the time, it was added without comment, but in retrospect, it appears suspicious.  These changes have since been reverted. In April of 2022, Jia Tan (aka JiaT75) submitted a patch to Xz via the mailing list.  Around the same time, two people began badgering the maintainer of Xz to add another maintainer because patches were not happening fast or often enough.  Neither of these people had any history in the open source community, and after these messages they were never seen again.  Over the course of 2022, JiaT75 becomes the second most active contributor to the xz project.  In January of 2023 JiaT75 merges their first direct code change, which means they have now achieved a level of trust that allows them to implement the code for the back door.  Over the course of 2023, changes were regularly made as JiaT75 implemented the back door one piece at a time.  In February of 2024, the last few files were completed.     While this was happening, the hacker was contacting the leads of all the major Linux distributions to get them to install the updated version of xz utils.  Richard WM Jones from Redhat wrote about his contact with the hacker and Redhat’s scramble to remove the backdoor once they found it, and Ubuntu has also made public the post from Jia Tan asking them to include it.  This is an overview of the timeline, you can find an excellent detailed version with links to the GitHub submissions and e-mails here.    An Unlikely Discovery  With all the careful measures taken to make this look legit, how did they get caught?  Purely by a stroke of luck. Andres Freund, a developer working at Microsoft, was troubleshooting a performance issue on a Debian Linux system.  When you remember that no stable version of Debian was released with the vulnerability, and therefore he was working on an experimental version, the sheer luck behind this discovery is astounding.  He noticed that SSH logins were using too much CPU and recalled an error he had seen in Valgrind (a program used to monitor computer memory), so he put the pieces together.  Thanks to his keen eye and serious investigative skills, he traced the problem to xz utils and sent a missive to the Open Source Security List to describe the problem.    Most people never dig this deep into performance issues, and even if they do, it takes a lot of system knowledge to be able to trace them to the specific cause the way Freund did.

 

We’re Safe Now, Right?…..Right?

Supply chain attacks are obviously not limited to open source software. After all, the reason most people know the term “Supply chain attack” is because of SolarWinds in 2020, which was most certainly not open source.  But still, this shows that open source software may be more vulnerable than others.  When the fake accounts began badgering Lasse Collin about lack of updates,  his response showed that the open source developers are subject to limited time, burnout, and other struggles just like closed source developers, and adding this on top of the fact that open source development is not paid, well…it’s easy to see how someone could make themselves popular very quickly, and how maybe new code is not always tested as thoroughly as it should be.  Again, this definitely isn’t a problem specific to open source, but it’s perhaps easier to exploit.  Regardless of the development method, we need to ramp up supply chain security across the board before the next attack is successful.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Spray-and-pray tactics get an upgrade. MSPs face advanced phishing

Cybercriminals leverage AceCryptor and Rescoms (RAT) to upgrade spam phishing messages difficult to recognize by both humans and machines. To defend, MSPs automate protection.  

When cybersecurity experts and vendors describe phishing attacks, they usually split them into two big groups.

The first group consists of spam campaigns targeting a broad general audience with simple fraudulent messages. This approach has a low success rate but can be easily deployed en masse. The second group involves sophisticated attacks tailored for a specific person or group of people. This requires more time and planning; however, this effort pays off with higher success rates and/or other value that attackers derive.

But there are also attacks that stand somewhere in the middle and benefit from both approaches. For example, their fraudulent messaging is simple and can target broader audiences, but at the same time they are able to avoid the usual phishing red flags, largely because malicious email attachments are obfuscated with specialized tools.

ESET researchers documented such an attack when they discovered an email phishing campaign targeting European businesses.

Advanced phishing campaigns using AI and various evasion techniques are on the rise and can pose a challenge even for managed service providers (MSPs), which aim to deliver seamless IT services, including cybersecurity, to their customers while also keeping in mind their own protection. Risk from these types of campaigns are mounting because even the most focused employees may fall victim to malicious emails despite previous awareness training. Moreover, basic types of anti-phishing protection may be unable to detect these threats.

To address these risks, ESET has beefed up the prevention capabilities, incorporating advanced Anti-Malware, Antispam, and Anti-Phishing protection into ESET PROTECT, a formidable cyber threat prevention, detection, and response platform that MSPs can utilize. Having all these automated layers of protection in one service, ESET PROTECT minimizes the email attack surface, simultaneously reducing the complexity of subsequent security processes.

The most prevalent attack

Year after year, numerous surveys and reports confirm that phishing is the most prevalent attack vector.

The latest ESET H2 2023 Threat Report shows that malicious HTML files sending victims to phishing websites (HTML/Phishing.Agent trojan) remain by far the most numerous type of email threat. Overall, these attacks comprise almost a quarter (23.4 percent) of all cyber threats detected by ESET.

When it comes to the business sector, one in four U.S. companies that faced a cyberattack noticed that the initial vector was phishing in 2022.

Between 2017 and 2023, the proportion of phishing attacks among all cyberattacks reported by U.K. organizations (businesses and charities) rose from 72% to 79%, according to a survey conducted by the U.K. Department for Science, Innovation and Technology. Also, 56% of the surveyed businesses responded that they consider phishing attacks as the most disruptive that businesses face.

Phishing doesn’t have to be simple

Many of these phishing campaigns can be easily dodged by following simple awareness advice. However, as with most things in the world of IT, things are getting more complex and sophisticated — so is phishing.

ESET researchers spotted one of the latest examples of this trend just recently when monitoring the Remote Access Trojan (RAT) Rescoms, also known as Remcos.

RATs are malware that allows attackers to remotely control an infected computer, and ESET researchers discovered several recent email phishing campaigns using Rescoms and targeting businesses in European countries, including Spain, Poland, Slovakia, Bulgaria, and Serbia.

The goal of those campaigns of an unknown actor was to obtain credentials stored in browsers or email clients, which in case of a successful compromise would open the possibility for further attacks.

What makes these Rescoms campaigns special is that they use AceCryptor, a cryptor-as-a-service malware that is designed to hide other malware from cybersecurity tools.

In H2 2023, ESET detection engines saw and blocked over double the attacks using AceCryptor in comparison with H1 2023.

Moreover, this cryptor wasn’t the only tool that did its bit. In order to make phishing emails look as credible as possible, the threat actor deployed several strategies:

  • All emails look like B2B offers for the victim companies.
  • Email addresses used to send spam emails were imitating domains of other companies.
  • Business email compromise (BEC) was involved in multiple campaigns — attackers abused previously compromised email accounts of other company employees to send spam emails.
  • Attackers did their research and used existing companies and even existing employees’/owners’ names and contact information when they were signing those emails.
  • The content of emails was in many cases quite elaborate.

Translated message:

Dear Sir,

I am Sylwester [redacted] from [redacted]. Your company was recommended to us by a business partner. Please quote the attached order list. Please also inform us about the payment terms.

We look forward to your response and further discussion.

Best Regards,

How to defend

Because regular cybersecurity awareness training for employees may not be enough, and MSPs often need to take care not only about their protection but also their clients’ protection, the answer to this situation must be multilayered protection.

The main idea is to protect businesses during several stages of the attack — when a malicious email arrives in the mailbox, when an employee opens it, when they click on an attached link or file, and when malware enters the company’s system if all previous defenses were avoided.

For example, look at the multilayered protection incorporated in the ESET PROTECT Platform:

  • Anti-Spam technology filters spam messages with almost 100% accuracy.
  • Anti-Phishing prevents users from accessing web pages known for phishing by parsing message bodies and subject lines to identify URLs. URLs are then compared against the phishing database and rules to determine the presence of a phishing attempt.
  •  Anti-malware scans email attachments to determine whether it is malicious, unknown, or safe.
  • ESET’s in-product Sandbox assists in identifying the real behavior hidden underneath the surface of obfuscated malware.
  • If ESET Mail Security is unsure of the potential threat, it can forward the attachment to the proactive cloud-based threat defense tool called ESET LiveGuard Advanced. It analyzes samples in a cloud sandbox, and then submits the result back to Mail Security within minutes.
  • If the malicious attachment is opened, it will face ESET Endpoint Security monitoring and evaluating all executed applications based on their behavior and reputation. It is designed to detect and block suspicious processes.

Such multilayered and automated protection can detect even advanced phishing email threats such as the recent Rescoms campaigns. In fact, ESET PROTECT placed second in the latest AV-Comparatives Awards with 99.9% malware samples blocked with zero false positives in enterprise category. Overall, ESET received a Top-Rated Product Award in 2023.

Battling alert fatigue

An important part of an MSPs’ defense is also mitigation of alert fatigue, a situation where IT admins are so overwhelmed by alerts that they miss or ignore serious issues.

To make MSPs admins’ lives easier, the ESET PROTECT Platform allows admins to automate a variety of actions, including the resolution of sophisticated incidents. ESET also has complex MSP program with subscription flexibility, a unified ecosystem, automated responses, and integrations with the major RMM and PSA players.

All these efforts have been proven to decrease disruptions in daily workflow of ESET customers:

“Day-to-day life doesn’t tend to get overly disrupted with ESET, which is brilliant for the help desk. They don’t want to be receiving calls, truth be told. But we want to be ensured that we are on top of things, and our customers can work without having to chew up too much of our time,” says Andrew Owens, Head of Sales in Risc IT Solutions, a cloud solutions provider cooperating with ESET for the last 10 years.

Mastering vigilance without burnout

It is estimated that there are 361 billion emails sent and received daily around the world, with more than 45 percent of them spam. With such a plentiful threat landscape, it is important for businesses to be prepared for attacks on an almost daily basis without wearing down the IT team.

Having a highly automated security ecosystem from a global leader in digital security is a great way to master vigilance in the world of constant cyberthreats.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.