Skip to content

Remotely: Tips from the UnderDefense Team

A recent survey by our friends at learning platform ELVTR discovered 68% of US employees still access their work devices while on vacation – leaving the door wide open for malicious attackers to penetrate business devices. While summer holidays are over, the issue is not closed given the high number of remote workers internationally. So, let’s dive into the top risks highlighted by top cybersecurity expert and our CEO at UnderDefense, Nazar Tymoshyk, and uncover how to conquer them.

Risk #1: Surfing the Cyber Waves Unprotected

The scene is set: your personal laptop, your favorite cafe, and the allure of free Wi-Fi. But here’s the catch – that free Wi-Fi can be a gateway for cybercriminals to sneak into your digital kingdom. Connecting to public networks and personal devices introduces significant security risks, leaving you vulnerable to data breaches, identity theft, and financial losses.

Solution:Nazar’s advice rings loud and clear: Get yourself a reputable Virtual Private Network (VPN). It’s like an invisibility cloak for your data, encrypting your internet traffic and keeping your sensitive information away from prying eyes.

Risk #2: The Stealthy Rogue Access Points

Imagine this: you’re lounging at the mall, connecting to what seems like a legit Wi-Fi network. Except, it’s a trap – a rogue access point set up by attackers. These sneaky networks mimic real ones, intercepting your internet traffic and potentially accessing your personal data. Scary, right?

Solution:Stay one step ahead of these tricksters by confirming the Wi-Fi’s legitimacy with the staff. And whenever you’re on public networks, fire up that trusty VPN for added protection.

Risk #3: The Web of Spoofed Sites

Cybercriminals have an uncanny knack for creating fake websites that look exactly like the real deal. You might think you’re logging into your bank’s website, but you’re actually giving away your credentials to a malicious actor. This trick, known as website spoofing, can lead to phishing attacks and compromised accounts.

Solution: Before you click any link, give it a hover to see the full URL. And always look for that trusty padlock icon in the address bar – it’s your digital seal of approval.

The SOS Plan for Suspicious Networks

If you suspect you’ve used insecure Wi-Fi, don’t panic. Just follow Nazar’s quick steps:

  • Change Passwords:Update passwords for your important accounts.
  • Financial Check:Keep an eye on your financial statements for any suspicious transactions.
  • Sweep Your Devices: Scan your personal devices with trusted antivirus and antimalware software.
  • Set Up Alerts:Enable account notifications for any unusual activities.
  • Call in Reinforcements:When in doubt, seek guidance from cybersecurity professionals or your IT department.

As we embrace the freedom of remote work, let’s not forget that with great freedom comes great responsibility – especially when it comes to security. 

Check out the full article on staying secure on vacation here, and don’t hesitate to get in touch with us if you need support! 

 

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About UnderDefense
UnderDefense, a globally top-ranked firm by Gartner and Clutch, provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats. We empower clients to predict, prevent, detect, and respond to threats.

Stellar Cyber to Showcase its Award-Winning Open XDR Platform at the 2023 RSA Cybersecurity Conference

See the only field-validated Open XDR Platform, which protects millions of connected assets and thousands of customers daily, in action during RSAC.

Stellar Cyber, the innovator of Open XDR technology, and recently recognized by Cyber Defense Magazine as the Most Innovative XDR Solution, will exhibit its Open XDR – driven SecOps platform at this year’s RSA cybersecurity conference at Moscone Center in San Francisco, CA, from Monday, April 24th through Thursday, April 27th. 

During the conference, Stellar Cyber experts will deliver on-demand demonstrations highlighting how lean security teams can experience a new streamlined approach to securing a diverse environment, slashing MTTD and MTTR with the Stellar Cyber Open XDR Platform.

Attendees will see how Stellar Cyber’s Open XDR Platform can: 

  • Automate detection of complex multi-vector attacks
  • Deliver hands-free incident context enrichment driving rapid investigations
  • Enable fast threat hunting across a universe of security data
  • Mitigate threats with “point-and-click” response actions 

“We are thrilled to participate in this year’s RSAC and look forward to meeting with security decision-makers that want to improve their security operations,“ says Steve Garrison, Vice President of Marketing at Stellar Cyber. “With so many vendors claiming to deliver similar capabilities and benefits, many buyers may find it difficult to find something that can address their challenges better. Well, we can, and we are prepared to prove it.” 

Since the Stellar Cyber Open XDR Platform debuted over four years ago, enterprises and MSSPs have reported double-digit improvements in both mean times to detect and respond to threats (MTTD & MTTR), meaning their security teams can do more faster. 

Here are two examples of what customers say about the Stellar Cyber Open XDR Platform:

“Stellar Cyber’s Open XDR platform is the only security tool we’ve seen that is so easy to use that it lets us bring in new analysts and have them immediately impact our organization and our customers.”
Brite Security Services

“Stellar Cyber helped close our visibility gap as no other solutions could. As a result, it has become indispensable to our organization, allowing us to act on potential threats immediately.”
Amanda Stowell, Information Security & Privacy Analyst, A-Dec

“The key to delivering results like we are seeing is our obsessive focus on simplicity,” said Sam Jones, Vice President of Product Management at Stellar Cyber. “By incorporating core security capabilities into a single platform and ingesting data from any security product, we eliminate the friction that exists in most security operations. We look forward to demonstrating our unique approach to security to the attendees at this year’s RSA conference.”

To see for yourself how Stellar Cyber can simplify your security operations, visit us in booth 244 in Moscone Center, South. 

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Stellar Cyber
We deliver an easy-to-use Open XDR platform built to meet the needs of lean security teams, providing security functionality anyone can use.
Our Mission: Deliver world-class security products for the 99%

Stellar Cyber Named a Strong Performer in Gartner Peer Insights™ Voice of the Customer for Network Detection and Response

Stellar Cyber Open XDR receives 4.8/5-star rating from customers on Gartner Peer Insights

Stellar Cyber, the innovator of Open XDR technology, today announced that it has been named a Strong Performer in the Gartner Peer Insights Voice of the Customer for Network Detection and Response. Network Detection and Response is just one of the core capabilities built into Stellar Cyber’s AI-driven Open XDR cybersecurity platform, which also includes NDR with next-generation SIEM, TIP and bi-directional integration with any third-party EDR solution.

As the report explains, “The “Voice of the Customer” is a document that synthesizes Gartner Peer Insights’ reviews into insights for IT decision makers. This aggregated peer perspective…focuses on direct peer experiences of implementing and operating a solution.” In the report’s detailed vendor summary, 100% of Stellar Cyber’s customers responded that they were willing to recommend the company’s Open XDR platform, and gave it a composite rating of 4.8 stars out of five across the product’s capabilities, sales experience, deployment experience, and support experience based on 20 reviews submitted as of March 2023 on Gartner Peer Insights.

“We have a strong commitment to our customers and partners to ensure they have successful deployments and utilize the full value of the Stellar Cyber Platform as their Open XDR Security Operations Platform,“ says Paul Levasseur, Vice President of Customer & Partner Enablement at Stellar Cyber. “We’re very happy that our customers are reporting their satisfaction through the Gartner Voice of the Customer report.” 

Gartner, Voice of the Customer for Network Detection and Response, Peer Contributors, 29 May 2023

Resources

Gartner and Peer Insights are trademarks of Gartner, Inc. and/or its affiliates. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Stellar Cyber
We deliver an easy-to-use Open XDR platform built to meet the needs of lean security teams, providing security functionality anyone can use.
Our Mission: Deliver world-class security products for the 99%

How to disable Edge password manager

Why you might want to deactivate Edge password manager

The Edge password manager is a convenient addition to the browser as it offers basic functionality by saving your passwords directly in the browser. However, there are several reasons you might consider moving away from the built-in tool.

  • Security risks: Sometimes, storing passwords in a browser can make them vulnerable to hacking attempts, especially if your device is lost or compromised. Cybercrooks often target browsers because quite a few people use them to store sensitive data such as passwords, payment cards, and personal details.

  • Limited features: While Edge’s password manager is convenient, it still lacks advanced features like password health analysis, secure password sharing, email masking, sub domain matching for autofill, and so much more.

  • Cross-platform incompatibility: If you use multiple browsers or devices on a daily basis for work or just to run personal errands, syncing passwords across those devices is critical; this way you’ll have your credentials with you at all times. Unfortunately, Edge’s password manager doesn’t offer seamless cross-platform support.

  • Preference for dedicated solutions: Dedicated password managers like NordPass provide enhanced security features, user-friendly interfaces, and better overall management of your digital credentials.

By deactivating Edge’s built-in password manager, you can opt for a solution that offers better security, more advanced features, and more flexibility.

Before you disable your Edge password manager

Disabling the password manager in your Edge browser is more than just flipping a switch. One critical step before disabling the built-in password manager is exporting and saving all your stored passwords. This backup is critical because once the password manager is disabled, your saved passwords may no longer be accessible.

Here’s how you can export your passwords from Edge:

  1. Open Microsoft Edge and click on the three horizontal dots in the upper-right corner.

  2. Select Settings from the drop-down menu.

  3. Click Profiles, then choose Passwords.

  4. At the top of the Saved passwords section, you’ll see an option with three dots. Click it and select Export passwords.

  5. Confirm the action, and choose a secure location on your device to save the exported file.

By exporting your passwords, you ensure that all your login information is safely stored and can be easily imported into a dedicated password manager like NordPass. This not only prevents the hassle of resetting passwords but also provides an opportunity to enhance your online security.

 

How to turn off Edge password manager

Disabling the password manager in Edge is quite simple and should not take too much of your time. Follow these detailed steps:

  1. Launch Microsoft Edge.

  2. Click the three horizontal dots in the upper-right corner of the browser window.

  3. From the dropdown, select Settings.

  4. In the left sidebar of the Settings page, click Profiles.

  5. Under the Profiles section, select Passwords.

  6. Find the option labeled Offer to save passwords.

  7. Toggle the switch to the Off position.

  8. Below that, toggle off Sign in automatically.

  9. If you want to delete the passwords already saved in Edge, scroll down to the Saved passwords section. Here, you can remove individual passwords by clicking the three dots next to each entry and selecting Delete.

  10. Close and reopen the browser to ensure that the changes take effect.

By following these steps, you’ve successfully turned off the password manager in Microsoft Edge.

What happens after disabling Edge password manager

Once you have turned the password manager off in Edge, the browser will no longer prompt you to save passwords when you sign into the website, nor will it automatically fill out your login credentials. In turn, this means that you will need to manually enter your usernames and passwords each time you access your accounts. This change presents a chance to improve your overall online security by switching to a password manager like NordPass. With NordPass, you can securely store your passwords, enjoy automatic form filling, and benefit from advanced security features that offer stronger protection than the built-in password managers.

Advantages of using NordPass over a built-in password manager

Switching to a dedicated password manager like NordPass is not an upgrade but a full change in how you secure and manage your life online. While the built-in password manager offers basic and convenient functionality, NordPass takes that to the next level with advanced features, advanced security, and unmatched convenience.

Advanced security measures

NordPass uses state-of-the-art encryption protocols, more precisely XChaCha20 encryption combined with zero-knowledge architecture. This essentially means that your data is encrypted on your device before reaching the servers of NordPass, and you alone retain keys for decrypting it. On top of that, NordPass supports multi-factor authentication (MFA), adding that extra layer of security by requiring further verification methods when trying to access your vault.

Seamless cross-platform functionality

With NordPass, your passwords, passkeys, payment card data, secure notes, and personal information are synchronized across all your devices, whether you’re using Windows, macOS, Linux, Android, or iOS. This cross-platform accessibility eliminates the limitations associated with browser-specific password managers. At the end of the day, with a dedicated password manager, you will have access to your credentials whenever and wherever you need them.

Better user experience and features

NordPass is designed in such a way that its intuitiveness and user-friendly interface make password management pretty easy, even if you’re not a tech-head. The Password Health feature goes through the passwords stored in your NordPass vault and identifies weak, reused, or old passwords, suggesting updates toward stronger alternatives. The built-in Data Breach Scanner monitors your credentials for exposure. If your information has been compromised, NordPass alerts you immediately so you can take immediate action to secure your accounts.

By transitioning to NordPass, you’re not merely replacing Edge’s basic password storage—you’re adopting a comprehensive security solution that actively safeguards your digital identity. NordPass’ advanced encryption, cross-platform accessibility, and user-friendly features elevate your online security to a higher standard.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How do password managers work?

Security guidelines state that all accounts, regardless of their importance, should use unique and complicated passwords. Unfortunately, the burden of juggling different accounts with long passwords that are difficult to keep track of or enter without typos leads to people settling for simpler, repetitive, and far less resilient passwords.

This struggle can be easily solved once you know how password managers work to support your credential handling. Whether it’s a built-in browser password manager or a dedicated third-party tool, they let you conveniently keep track of your credentials without losing out on that security factor. Let’s look into how password managers actually work, what features they may offer, and what makes them a safe choice to store all sensitive details in one place.

What is a password manager?

Password managers are pretty self-explanatory—they’re tools that let you store and manage your login credentials. They do the heavy lifting for you by storing your essential login information, such as your usernames, passwords, and email addresses.

Even if the term doesn’t ring a bell, chances are you’ve already used one before. Browsers like Chrome, Firefox, and Opera have built-in password managers that let you save your login details, saving you time whenever you need to log in. Third-party password managers are generally regarded as a more secure alternative to their browser counterparts.

What does a password manager do?

The primary purpose of a password manager is to provide secure storage for sensitive information. This is achieved through encryption—the process of scrambling data so that it can only be accessed if you have the right key to decipher it. A password manager like NordPass encrypts information on your device and, once it’s scrambled, sends it to the servers for safekeeping. This helps ensure that even in the case of a breach, the data is not accessible to unauthorized parties in plaintext.

As for the data itself—despite the name, password managers are not limited to passwords alone. They also provide storage for email addresses, personal addresses, ID information, banking details, and any other sensitive data that you want to keep safe. Password managers can even provide storage for passwordless solutions—NordPass lets its users store and manage passkeys.

Secure storage is just the tip of the iceberg. By now, password generators are a basic requirement for both browser-based and standalone password managers. Password generators help easily create unique and complex passwords that meet the standards of various security protocols. Instead of coming up with a password yourself, you can have the password manager generate a random, one-of-a-kind string of characters for you.

Password managers can take the chore out of finding the right password for the right account. Although you can use the vault search function or sort your credentials alphabetically when you need them, password managers eliminate this manual step altogether with autofill. This function instantly finds the login credentials you need and inputs them for you, instantly letting you access your account. Additionally, autosave detects whenever you’re entering credentials that aren’t in your vault and lets you store them without needing to type them out yourself.

 

Family password management

We usually focus on the benefits password managers offer to individuals. But did you know that you can share this tool with your friends and family and keep your entire closest circle protected online?

A password manager facilitates secure and convenient credential sharing. Imagine a family of five using a single Amazon account but scattered across different households. Using a password manager like NordPass, they can securely juggle access to the shared account. No need to send an unencrypted text message, a screenshot, or spell it out over the phone—you can simply select the password you want to share, who you want to share it with, and what access permissions you want to grant.

Managing passwords within a family is also convenient for broader security. Setting up a NordPass Family account grants access to Premium features like the Data Breach Scanner, which tracks the dark web for any signs of leaked personal information, and Password Health, which lets you know if any of your passwords are old, weak, or reused.

Multiply that by six, and you have your family’s cybersecurity sorted. And don’t forget, a family password manager doesn’t mean it has to be your relatives only—you can bring your spouse or friends along for the ride.

Business password management

Have you ever given in to the temptation to reuse one of your personal passwords for a work-related account to save time? It wouldn’t be surprising—between juggling accounts for personal and professional use, an average person has to handle 168 and 87 passwords, respectively.

A business password manager is here to keep things simple and separate personal and work credentials. It helps organizations optimize their workflows and implement centralized password usage policies that uphold high security standards.

Many features related to corporate credential security are handled from the admin side of password managers. For example, using NordPass, security managers can establish password strength requirements, such as password length, use of special characters, and frequency of updates.

Companies can set up extra layers of security, like multi-factor authentication, across the company. Additionally, NordPass offers a built-in Authenticator, allowing employees to easily generate two-factor codes for their work accounts and access login credentials all in one place.

As for employees themselves, they can handle their work-related accounts, such as corporate emails, social media communications, or banking. They can also securely share credentials with their colleagues or clients for collaboration.

NordPass allows Business users to control their shared access permissions to maintain data security. No need to fear losing track of what’s been shared—the Activity Log gives a clear overview of who created, edited, or granted access to credentials.

How to use a password manager

The hardest step in getting started with a password manager is finding the right one for you. The core will be similar everywhere—all you need to do is create an account, set up a master password, and add credentials to your encrypted vault. And if you’re looking for additional security for your cyber life, look no further than NordPass.

Whether you’re looking to cover your own personal needs, handle sensitive work-related data, or share passwords more securely with your friends and family, NordPass offers something for everyone. It’s built on zero-knowledge architecture and uses XChaCha20 encryption to provide a high level of security for both your personal and professional sensitive data. Start your hassle-free digital life with NordPass—a password manager that puts convenience first without compromising your security.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

2023 A year of achievements and transformations at Pandora FMS!

On this exciting journey, we celebrate the successes of our team over the course of an incredibly productive year. From solving 2677 development tickets and 2011 support tickets to spending 5680 hours on projects and operations, each metric represents our shared dedication and success with our valued customers, which are the engine of our growth. 

We reinforced our commitment to security by becoming an official CNA in collaboration with INCIBE (National Cybersecurity Institute of Spain). This prestigious achievement placed Pandora FMS, Pandora ITSM and Pandora RC as the 200th CNA worldwide and the third CNA in Spain. Our recognition as CNA (Common Vulnerabilities and Exposures Numbering Authority) means that Pandora FMS is now part of a select group of organizations that coordinate and manage the assignment of CVE (Common Vulnerabilities and Exposures), uniquely identifying security issues and collaborating on their resolution.

During this year, we experienced an exciting brand unification. What started as Artica at Pandora FMS has evolved into a single name: Pandora FMS. This transition reflects our consolidation as a single entity, reinforcing our commitment to excellence and simplifying our identity.

Globally, we excelled at key events, from Riyadh’s Blackhat to Madrid Tech Show. In addition, we expanded into new markets, conquering China, Cameroon, Ivory Coast, Nicaragua and Saudi Arabia.

We evolved eHorus into Pandora RC and transformed Integria into Pandora ITSM, strengthening our presence in the market. We launched a new online course platform and developed a multi-version documentation system in four languages.

We proudly highlighted the technological milestone of the year: the creation of the MADE system (Monitoring Anomaly Detection Engine), the result of our collaboration with the Carlos III University of Madrid. Presented at the ASLAN 2023 Congress & Expo in Madrid, MADE uses Artificial Intelligence to monitor extensive amounts of data, automatically adapting to each management environment. This innovation sets a radical change in monitoring by getting rid of the need for manual rule configuration, allowing the adaptation to data dynamics to be fully autonomous.

This year was not only technical, but also personal. From the fewest face-to-face office hours in 17 years to small personal anecdotes, every detail counts.

Let’s celebrate together the extraordinary effort and dedication of the whole team in this new stage as Pandora FMS! Congratulations on an exceptional year, full of success in every step we took!

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

7 Cybersecurity podcasts to check out in 2024

The top cybersecurity podcasts today

The world of cybersecurity is complex and constantly changing. For experts, beginners, and everyone in between, cybersecurity podcasts are a valuable source of knowledge.

In 2024, cybersecurity podcasts have become more varied and informative than ever. They provide insights, stories, and analysis for all levels of interest and expertise.

These podcasts explore various topics, from cybercrime mysteries to high-level digital security strategies.

Explore with us the seven best cybersecurity podcasts of this year, each bringing unique insights and crucial information in this field.

Darknet Diaries

01 Supporting-visual 1400x862Darknet Diaries,’ hosted by Jack Rhysider, explores the lesser-known aspects of the digital world.

Since its start in September 2017, the podcast has gained popularity for its in-depth cybercrime stories. Rhysider’s expertise in security engineering and SOC experience enriches each episode.

Listeners are drawn to ‘Darknet Diaries’ for its investigative style and insights into pen-testing. The podcast’s clear explanations and expert guests make complex subjects understandable. It’s an engaging and informative podcast, appealing to both IT professionals and the general public.

Hacked

02 Supporting-visual 1400x862Hacked’ explores how technology impacts our lives in unexpected ways.

This biweekly podcast shares stories about technology mishaps and cybersecurity, narrated with skill and insight. Since October 2015, it has attracted a loyal audience, reflected in its strong Spotify rating.

Jordan Bloemen adds narrative flair and creative expertise to the podcast. Scott Francis Winder contributes strategic insights from his experience in a leading creative agency. Their conversations turn technical topics into engaging, understandable stories, blending cybersecurity news with light-hearted elements.

Security Now

Security Now‘ stands out with the expertise of Steve Gibson and Leo Laporte in computer security. Steve Gibson’s over fifty years in programming have significantly shaped the cybersecurity industry. His notable work includes creating light pen technology and founding Gibson Research Corporation. Leo Laporte brings a wealth of knowledge from his long career in tech shows since 1991.

Launched in August 2005, this podcast is likely one of the oldest broadcasting in cybersecurity. It covers a broad range of tech events and security challenges, appealing to diverse listeners.

On a side note, all the transcripts of their shows are available on their old-school website for those who prefer reading.

CyberWire Daily

04 Supporting-visual 1400x862CyberWire Daily,’ produced by the CyberWire team, provides daily updates on cybersecurity. Since December 2015, it has become a trusted source of global cybersecurity expertise. Host Dave Bittner, who is experienced in digital media, makes complex cybersecurity issues understandable.

CyberWire, the creator of the podcast, started in September 2012 and is known for impartial, comprehensive cybersecurity coverage.

The podcast features a daily news format and special segments like ‘Career Notes,’ highlighting cybersecurity professionals’ paths, and ‘Research Saturday’ to discuss new studies.

Smashing Security

Smashing Security,’ with hosts Graham Cluley and Carole Theriault, has been discussing cybersecurity weekly since December 2016. Cluley, a pioneer in antivirus development and a respected blogger, has influenced cybersecurity for decades. Theriault, who started the Sophos Naked Security site, now directs a digital media company.

The podcast stands out for its engaging and conversational approach, often featuring interesting guests. Cluley and Theriault simplify cybersecurity topics, making them enjoyable and easy to understand.

They provide additional resources for listeners who want to explore topics more deeply.

‘Smashing Security’ combines expert knowledge with an accessible style.

Cybersecurity Simplified

Cybersecurity Simplified,’ a monthly podcast since January 2021, features hosts with extensive experience in the field. David Barton, a CTO and CISO with over twenty years in cybersecurity, shares his practical expertise. Susanna Song brings her 15 years of experience in journalism and communications, adding clarity and engagement to the podcast.

Each episode, under 30 minutes, simplifies online safety in a way everyone can understand. They focus on current cybersecurity news and trends, and Barton shares practical strategies from his CTO experience.

As one of the most accessible cybersecurity podcasts, ‘Cybersecurity Simplified’ is known for its blend of security experts’ analysis and clear explanations, ideal for understanding digital safety.

Risky Business

Risky Business‘ isn’t the 80s movie with Tom Cruise, but a long-running show that has been making waves since February 2007. The podcast, led by an experienced team, covers everything from technical details to emerging trends. Regular guest hosts add diversity and new perspectives to the discussions.

Listeners tune in for credible news and thoughtful analysis. They love the depth of expertise and the engaging storytelling style.

Praised for its common-sense style and balanced discussions, ‘Risky Business’ is both educational and accessible.

New to NordPass?

You don’t need to be a rocket scientist to start using NordPass on a desktop device. Just add the standalone extension and you’re all set — no need to download or install the app!

Check out our detailed support guide for getting started with NordPass quickly and easily.

Once you have the new extension running on your browser, you can start using NordPass to its fullest extent.

If you have any further questions regarding the changes or NordPass in general, do not hesitate to contact our tech-minded support team at support@nordpass.com — they’re ready to take care of any issues you might have. Also, if you have any suggestions or feedback, simply submit a request for our team — we’re all ears, all the time.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

MSPs putting a stop to “hide and seek” within their environments with ESET Cloud Office Security

Amidst increased obfuscation of multistage malware attacks, MSPs need an effective way to secure cloud communication while avoiding the need for multiple unique network connection authorizations. 

The days of simple and easily detectable malware are long gone. Recent campaigns by both OilRig and MuddyWater advanced persistent threat (APT) groups show that threat actors are constantly seeking new ways to hide their multistage malware attacks among files of commonly used cloud services.

This presents a dilemma for managed service providers (MSPs) that rely heavily on cloud-based solutions. But how should MSPs defend against increasingly sophisticated attacks without the burden of trying to control every single stream of communication within the MSP environment?

A growing market and a growing threat

With the never-ending hunger for cloud-managed services, it is no surprise that the MSP market is constantly expanding, and business reports, such as MarketsandMarkets, expect further growth by around $100 billion U.S. dollars within the next five years.

Both MSPs and other outsourced business practices have proven to be the answer for countless companies seeking high-end solutions for reasonable prices. But there are two sides to every coin. Professional communications, services, and shared files all moving to the cloud has created a new breeding ground for sophisticated malware.

Threat actors deploying this malware are often profit-driven and/or state-sponsored APT groups using command-and-control (C&C) servers to communicate with compromised devices over targeted networks. When successful, these servers can issue commands to steal or encrypt data, spread malware, disrupt web services, and more.

To enable this approach, APT groups need to establish persistence within the targeted businesses, obfuscating malicious files and processes among legitimate ones.

A draft email you’ll never send … nor ever even wrote

ESET researchers have described recent attacks in detail while following the evolution of campaigns run by the OilRig group.

To avoid cybersecurity scanning tools, OilRig has not been deploying fully fledged malware but, instead, has scaled its attacks. While the initial attack vector of the recent campaigns remains unknown, presumably it was a phishing email. This email would contain a downloader that wouldn’t cause any specific damage but, as the name implies, is designed to secretly download additional malware from the internet. Several versions of these downloaders have been documented by ESET researchers.

Studying these downloaders, it is clear that OilRig is keenly focused on identifying new ways to obfuscate malware deployment using legitimate cloud service providers for C&C communication.

The first in the series, SC5k downloader, uses the a shared Microsoft Exchange email account and Microsoft Office Exchange Web Services API for C&C communication. Within this email account, the attackers create draft messages with hidden commands. Once the downloader infests a device, it will log in to the same account to receive both the commands and the payloads to execute. Its successor, OilCheck, works similarly but uses the Outlook mail API in Microsoft Graph. 

New versions of OilRig downloaders, ODAgent and OilBooster, communicate using the Microsoft Graph OneDrive API. They access a OneDrive account controlled by the attackers for C&C communication and exfiltration.

The evolution of malware-hiding capabilities was also recently noted in the case of another APT group linked to Iran called MuddyWater

In a separate MuddyWater campaign, described by DeepInstinct, the APT group reused previously known remote administration tools and hid them in the cloud-based content management system (CMS), called Storyblok, to host archives with compromised files.

ESET to help deal with the dilemma

The hiding capabilities of present-day C&C attacks have pushed businesses toward higher control over their network traffic. From standard network monitoring, it can go as far as individually authorizing any network connection.

However, the higher the control, the higher the workload on MSP admins and technicians who are already drained from a never-ending stream of alerts. So what do businesses choose: strict control that comes with alert fatigue or lower security standards that can result in a data breach?

With its MSP Program, ESET can help businesses deal with this dilemma. The program is based on the ESET PROTECT solution, which provides multilayered protection, and its higher tiers also integrate ESET Cloud Office Security (ECOS), which is designed to protect Microsoft 365 and Google Workspace applications.

ECOS — effectiveness in numbers*

  • 750,000 email threats detected
  • 360,000 phishing emails blocked
  • 21 million spam emails captured

*7-month period in 2023

In fact, these ESET security solutions can disrupt the described C&C processes at several stages, which means that companies don’t have to focus on network control as much.

Anti-phishing protection

Though the initial attack vectors of OilRig and MuddyWater campaigns are unknown, both APT groups have successfully kicked off their campaigns with phishing emails in the past. ECOS prevents users from accessing web pages known for phishing once they click on the phishing link in the email.

Antimalware protection

ESET’s defense against malware eliminates all types of threats. Moreover, ECOS scans all new and changed files in OneDrive, Google Drive, Microsoft Teams, and SharePoint Online.

ESET LiveGuard Advanced

If ESET malware detection engines detect a never-before-seen type of threat, they pass the file to the ESET cloud-based sandboxing tool ESET LiveGuard Advanced for further assessment.

Multi-tenant

ECOS multi-tenant functionality allows you to protect and manage multiple Microsoft 365 and Google Workspace tenants from one ESET Cloud Office Security console.

Conclusion

The growth of cloud-based business practices has ushered in cloud-based cyberattack tactics that MSPs need to deal with. And the results can be dire. With their privileged access to business networks, compromised MSPs can also be dangerous for their clients by triggering a supply chain attack.

The good news is that you don’t need to face those threats alone. Since its foundation in 1992, ESET has developed a robust multilayered defense system capable of stopping C&C attacks at different stages and much more. ESET solutions are also available for MSPs as a part of the ESET MSP Program. Don’t be the weak link in supplier relationships. Be the strongest. 

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

The Cybercrime Season

As the festive lights begin to twinkle and the holiday season approaches, there is a not-so-jolly phenomenon lurking in the digital shadows: the annual boom in cybercrime. The 2022 holiday season witnessed an alarming 550% increase in unique threats, painting a concerning picture of the cyber threatscape.  Cybercriminals around the world are capitalizing on the holiday rush, leaving a trail of financial losses, fraud and compromised cybersecurity in their wake.

Counting the Cost

The financial loss from cybercrime during the holidays is staggering. In the UK alone, shoppers lost a jaw-dropping £10.6 million ($13 million) during the 2022 festive season. Norton’s 2022 findings reveal that about one in three adults (34%) in the U.S. are taking more risks with online shopping as the holidays draw near, echoing a global trend where 32% of adults admit that they are more lax about online security during the festive season.

Why Cyber Attacks Surge During the Holiday Season

Festive Mood: The holiday season brings a range of emotions, from joy to stress. People may be more susceptible to cyber threats when they are distracted or emotionally charged, making them an easy target for phishing attacks.

Holiday Shopping Season: The holiday season sees a significant increase in online shopping as people search for the perfect gifts. Cybercriminals are capitalizing on this surge using tactics such as creating fake online stores, phishing emails, and malicious links.

Travels & Public Networks: With many people traveling during the holidays, the use of unsecured networks and devices has become prevalent. Cybercriminals exploit vulnerabilities in public Wi-Fi, compromising the security of those transmitting sensitive information while on the go.

Holiday Edition Scams: Scammers, hackers, and criminals are taking advantage of the goodwill surrounding the holidays by launching fake charity websites or gift cards and fraudulent travel offers to exploit people’s generosity and trust.

Social Media Sharing: Holiday travels or family celebrations are often shared on social media. Cybercriminals may use this information to craft targeted attacks, such as phishing attempts or account takeover schemes.

Most Common Types of Holiday Season Attacks


Phishing:

Cybercriminals are sending deceptive emails, messages, ads or links designed to look like holiday communications, impersonating legitimate entities to trick users into disclosing sensitive information.

Ransomware:

Companies face increased vulnerability to ransomware attacks during the holiday season. The need to maintain uninterrupted operations and secure them during the busy season often makes companies more willing to pay the ransom as the potential loss of valuable data and the risk of operational disruptions become increasingly untenable.

DDoS Attacks:

Distributed Denial of Service attacks surge, targeting sites, organizations and online services to overwhelm them and disrupt their normal functioning. This leads to frustration among both employees and customers and causes a significant impact on both revenue and productivity.

Account Takeover (ATO):

During the holiday season, many factors cause people to pay less attention to their digital hygiene. This helps cybercriminals gain unauthorized access to user accounts by exploiting compromised credentials for various malicious activities.

 

Recommendations to Reduce Cybercrime Risks

  • Stick to well-known and reputable online retailers to minimize the risk of consumers falling victim to fake websites.
  • Enable two-factor authentication (2FA) whenever possible to protect your accounts from unauthorized access.
  • Regularly update antivirus and security software to stay protected against the latest threats.
  • Avoid entering sensitive information anywhere when using public Wi-Fi, especially when traveling.
  • Before making donations or taking advantage of holiday deals, verify the legitimacy of the company on the websites and offers to prevent falling for scams.
  • Proactively safeguard yourself against malicious websites, phishing attempts, and harmful content using web filtering that blocks access to dangerous resources and provides one more layer of security.
  • Educate yourself and stay informed about common cyber threats and scams to recognize and avoid potential risks.

By understanding the reasons behind the increase in cyber attacks, recognizing specific threats, and implementing recommended security measures, you can protect yourselves from the Grinches of the cyber world.

Let’s celebrate the holidays with joy, warmth, and a commitment to protecting ourselves and our digital cheer.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

How Cloud-Based PKI is Transforming Network Authentication & Security

The need for robust and scalable security solutions is more pressing than ever thanks in large part to the emergence of increasingly sophisticated cyber threats. Amidst this backdrop, cloud-based public key infrastructure (PKI) emerges as a beacon of reliability and efficiency. This article delves into the advantages of leveraging cloud-based PKI for network authentication and security, a topic that resonates with the ongoing transformation in cybersecurity practices.

Cloud-based PKI refers to the deployment of public key infrastructure, a framework for managing digital certificates and public-key encryption, through cloud services. Unlike traditional on-premises PKI solutions, cloud-based PKI offers a blend of flexibility, scalability, and cost-effectiveness, making it increasingly popular among businesses and organizations.

Scalability and Flexibility

One of the paramount benefits of cloud-based PKI is its scalability. As organizations grow, their security needs evolve, necessitating a system that can seamlessly scale up or down. Cloud-based PKI platforms can easily accommodate changes in certificate volume or demand, without the need for extensive physical infrastructure. This scalability extends to the flexibility of managing digital certificates, allowing organizations to swiftly adapt to new security challenges.

Cost-Effectiveness

Transitioning to cloud-based public key infrastructure also translates to significant cost savings. Traditional PKI solutions often require substantial upfront investment in hardware, software, and specialized personnel. Cloud-based PKI, on the other hand, operates on a subscription-based model, which reduces capital expenditure and turns it into an operational cost. This shift not only makes PKI more accessible to a broader range of organizations but also allows for better budgeting and resource allocation.

Enhanced Security

Cloud-based PKI solutions come with the added advantage of enhanced security. Cloud providers typically employ advanced security measures, including regular updates and patches, to protect the infrastructure against emerging threats. This level of security is often more comprehensive and up-to-date than what individual organizations can achieve on their own.

Simplified Management and Compliance

Managing a PKI environment can be complex, especially when it comes to compliance with industry standards and regulations. Cloud-based PKI simplifies this process by offering tools and frameworks that streamline certificate management. Automated workflows, easy-to-use interfaces, and compliance-ready configurations reduce the administrative burden and minimize the risk of human error.

Accessibility and Disaster Recovery

The cloud-based nature of these PKI solutions ensures high availability and accessibility. Users can manage certificates and access the system from anywhere, fostering remote working and global operations. Moreover, cloud providers often have robust disaster recovery and backup strategies, ensuring continuity and security of the PKI system even in the event of physical disasters or data center outages.

Rapid Deployment and Integration

Deploying a cloud-based public key infrastructure solution is typically quicker and less complex than setting up an in-house system. Cloud providers offer pre-configured environments that can be rapidly integrated with existing IT infrastructure. This speed of deployment is crucial for organizations needing to quickly adapt to changing security requirements.

Future-Proofing with Cloud-Based PKI

As technology continues to advance, cloud-based public key infrastructure offers a pathway to future-proofing security infrastructure. Cloud providers consistently update their services to incorporate the latest security technologies and protocols, ensuring that organizations are not left behind in the evolving digital landscape.

Challenges and Considerations

While cloud-based public key infrastructure offers numerous benefits, organizations must also consider potential challenges. These include ensuring data privacy, understanding the shared responsibility model of cloud security, and choosing the right cloud provider that aligns with their specific needs and compliance requirements.

Embracing the Cloud for Enhanced Security

In conclusion, cloud-based PKI stands as a pivotal solution for contemporary network authentication and security challenges. Its scalability, cost-effectiveness, enhanced security, and ease of management make it an attractive option for organizations looking to bolster their digital defenses. As businesses navigate the complexities of cybersecurity, cloud-based public key infrastructure offers a pathway to a more secure, flexible, and efficient digital future.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。