Skip to content

Racing with MITRE to forge ESET Inspect for SOC and MDR use

 

ESET’s journey through 2024’s TTP-heavy Enterprise ATT&CK evaluation demonstrates both progress and scope for continued enhancement of our detection-and-response solution, as well as an interesting contrast with commercial tests.

Six years into MITRE Enterprise evaluations, with their consistent focus on attack emulations leveraging a vast collection of tactics, techniques and procedures (TTPs), vendors are now finding evolved detection and protection scenarios added to the mix. MITRE’s team of experts has clearly been working agilely, prompting vendors to adapt to the new test environment. Simultaneously, vendors looking to position themselves for the “win” and improve sales prospects increasingly face a paradox with MITRE: It’s still not a competitive test. Rather, the takeaways provide most value to security analysts involved in the day-to-day work of operating endpoint detection and response platforms.

This year’s evaluation has introduced some substantial changes. Notably, MITRE dropped telemetry from the detection categories, raising the threshold for a recorded event to be considered a detection. To counteract vendors’ gaming products to “win” or “detect everything,” a proportion of substeps now test for false positives rather than detections, while other substeps are not evaluated at all. In a final nod to address “points” accumulated via “detecting everything,” MITRE measures the number of detections in the dashboard, again cutting into “point gain” via bloated numbers of detections.

ESET also brought changes to the table, most significantly by fielding ESET Incident Creator, a module in ESET Inspect for incident-focused handling of threats. Incident Creator proved its use case in the detection portion of the evaluation, transforming how analysts are presented with detections generated from a cyberattack; detections are rolled up into incidents, giving analysts a focused view of how each attack progressed. With this tool in hand, we demonstrated good visibility into each attack scenario, detecting all steps and most meaningful substeps while maintaining a low volume of detections. Thus, for ESET, most missed substeps, e.g., API calls, provide the analyst with little to no value, could be discovered via other means, and present almost no loss of information for the reconstruction of the attack.

What we learned about our product

The most recent round of the ATT&CK Evaluations Enterprise pitted multiple vendors’ detection and response platforms against three attack scenarios named DPRK, CI0p, and LockBit, as well as a battery of 10 protection tests. With well-recognized research on all of the threat groups chosen for the scenarios, ESET engineers were interested to observe how ESET Inspect’s behavior could translate to supporting SOC operators as well as organizations leveraging security service offers such as ESET MDR.

With a nod to ESET’s preoccupation with efficiency, and MITRE’s new rules seeking to limit a detect-everything approach, the three attacks generated plenty of detections – correlated into incidents – allowing incident responders to easily understand how the attacks happened and thus take quick remediation. Additionally, the Incident Creator module eliminated considerable noise for the benefit of threat analysts – another priority for ESET, both inside and outside this test environment.

Turning off protection for the evaluation, and back on for the real world

With one of MITRE’s goals being to examine coverage of the TTPs in the ATT&CK knowledge base, vendors’ products in the detection scenarios are configured to not block or kill any of the threats they encounter. This is an important point because, in the real world, many of the threats employed in these scenarios would have been blocked either on first encounter or very soon thereafter.

For ESET, there are several fitting cases to highlight: The CI0p and LockBit ransomware samples, along with a couple other samples, would have been blocked in the first evaluation run. Although masked by the evaluation’s focus on ESET Inspect, it was actually ESET Live Guard Advanced, a key technology layer in the ESET PROTECT platform, that was behind the initial detection and blocking of these ransomware samples. Any remaining malware would have been blocked on the second run. This is good news in the real world because it means that customers benefit from efficient protection against threats.

In regard to the protection tests, while there are a few areas to improve the coverage provided by our products, 2024’s tests mainly focused on isolated and sometimes not clearly malicious substeps that, in the real world, could actually be benign and thus cause harm to customers if blocked. On real-world systems, cyberattackers aren’t running techniques and procedures “atomically,” i.e., disconnected from a full attack chain. Instead, their operations are a buildup, and the task of detection and response solutions is to correlate the full context to identify correctly that something malicious is afoot.

Figure 2. Detection of the SDBbot installer in the Cl0p config change run

Figure 3. Detection of the Firefox password stealer in the LockBit config change run

 

We are left feeling that the pursuit of total coverage of the ATT&CK knowledge base does not necessarily improve defenses or automatically assist security analysts in their daily work. In contrast to forensics or malware analysis, detection and response require only enough coverage of highly prevalent or severe techniques (or substeps) for the analyst to trigger a response. Missing detections for low-prevalence or low-severity techniques does not necessarily translate to lower protection. Quite the opposite, it could mean that work is streamlined, and remediation is faster because the major steps needed to identify the attack are immediately highlighted, thereby allowing a timely and adequate response to be triggered – in some cases even with automatic blocking of the detected threat.

Again, outside the ATT&CK Evaluations and atomic testing scenarios, third-party tests usually design scenarios that don’t prioritize coverage of TTPs. Instead, they measure blocking, false positives, performance, cost, and the like by a fully functioning product suite. They also focus more on critical steps of an attack, such as endpoint compromise and foothold, internal propagation, and asset breach.  The ultimate arbiter is stopping an attack, whether by blocking malicious files or killing malicious processes, or at least providing the security analyst with the means to do so.

“What sets this solution apart is its ability to deliver rapid response times, robust threat intelligence, and strong ransomware protection, all while offering strong compliance and localization support.”

-Warwick Ashford, Senior Analyst at KuppingerCole

A number of strong results demonstrate the efficacy of real-world performance. This includes real-world tests, such as AV-Comparatives’ Endpoint Prevention & Response (EPR) Test 2024 and 2023, and analyst perspectives, including selection of ESET as a leader in both KuppingerCole’s Leadership Compass for MDR and Leadership Compass for Endpoint Protection Detection & Response.

In KuppingerCole’s executive summary of the EPDR market, they discuss the wider industry’s use of the MITRE ATT&CK framework, as well as the fact that endpoint protection platforms and EDR tool sets have converged into the logical integrated pairing of Endpoint Protection Detection & Response (EPDR). This means the majority of vendors aim to improve based on MITRE’s micro-emulation of techniques and procedures, while developing successful, integrated EPDR proven by industry-standard, real-world testing. Ideally, covering these two scopes makes for battle-ready detection and response.

Battle-ready EPDR

In fact, EPDR solutions are the battle-ready systems that institutions and businesses invest in, deploy, and operate today. Above and beyond this, ESET continues to seek out other avenues to challenge its products and its engineers. Perhaps the zenith of this search has been reached with our regular participation at Locked Shields, a military simulation of today’s digital battlespace organized by the NATO Cooperative Cyber Defense Centre of Excellence.

In 2024, more than 60 ESET system engineers, security monitoring analysts, malware researchers and analysts, and comms specialists formed ranks with defenders from the Slovak and Hungarian militaries and the private and academic sectors to defend our assigned battlespace.

Our tool, ESET Inspect, backed by our multilayered security platform ESET PROTECT, was central to Slovakia-Hungary’s fourth place out of 18 participating teams and helped the team to top three placings in cyber threat intelligence, client-side protection and forensics. This cyber-battle simulation was an intensively immersive experience for all the technologists involved, whether as threat analysts working to understand the TTPs to anticipate the next stages of an attack or engineers configuring cyber defenses.

Conclusion

ESET remains as motivated to leverage MITRE’s Enterprise Evaluations to feed technical audiences with critical food for thought as we are to invest our institutional knowledge in Locked Shields to advance both our security practice and that of our NATO partners. The output of our engagement with MITRE, whether via the +350 contributions to the ATT&CK knowledge base or participation in the ATT&CK Evaluations, continues to be sharpened detection and response capabilities tuned to the real world and protecting our shared progress.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Scale Computing Named 2024 DCD>Awards Edge Data Center Project of the Year Winner

Scale Computing Named 2024 DCD>Awards Edge Data Center Project of the Year Winner 

INDIANAPOLIS – December 19, 2024 – Scale Computing, the market leader in edge computing, virtualization, and hyperconverged solutions, today announced that Data Center Dynamics (DCD) has honored its deployment with Royal Farms—an established convenience store and fuel chain with more than 300 U.S. locations—with the 2024 Edge Data Center Project of the Year award.

The DCD>Awards recognize exceptional innovation, leadership, and results within the data center industry. This award category recognizes projects that can demonstrate a unique and strategic approach as to how a successful Edge deployment is designed, set up and operated, and show how this creates new and exciting opportunities for delivering on IT and business objectives. This year’s distinction spotlights the successful partnership between Scale Computing and Royal Farms, showcasing how a forward-looking edge computing strategy can transform operational efficiency, reduce complexity, and deliver a superior customer experience.

Royal Farms sought a modern, resilient, and cost-effective edge infrastructure solution to streamline IT operations across its distributed locations. By deploying the Scale Computing Platform (SC//Platform) at the store level, the company dramatically simplified its infrastructure, shortening installation times by 90% and decreasing management overhead and licensing costs by 75%. The result was a self-healing, automated environment that ensures reliable performance and high availability for critical applications, ultimately improving daily operations and enabling continuous innovation at the edge.

“We’re honored that Data Center Dynamics has recognized our work with the 2024 Edge Data Center Project of the Year award,” said Jeff Ready, CEO and co-founder, Scale Computing. “This award highlights how advanced edge computing solutions can redefine distributed IT environments, enabling organizations to improve performance, reduce complexity, and ultimately deliver a better experience to their customers.”

By continuing to deliver agile, high-performance solutions that simplify deployment and maintenance across distributed environments, Scale Computing helps organizations like Royal Farms gain unprecedented control over their IT environments. As enterprises increasingly embrace the edge to meet customer demands and drive competitive advantages, Scale Computing remains committed to delivering solutions that enable seamless, reliable, and cost-effective operations no matter where data and applications reside.

The DCD>Awards recognizes the most outstanding projects, people and teams across 17 categories. An independent panel of judges reviewed hundreds of entries submitted. Winners were announced December 11th at the 18th annual awards ceremony at Grosvenor House in London, and broadcast live worldwide.

To learn more about Scale Computing’s edge computing solutions and its award-winning work with Royal Farms, watch the video case study and explore additional insights at: https://www.scalecomputing.com/resources/why-royal-farms-chose-scale-computing.

About Scale Computing
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

2024 at NordLayer, that’s a wrap

Summary: NordLayer had an exciting 2024. We turned five this year, launched new features, and won cybersecurity awards. Next stop: 2025.

The year is coming to a close, and the holidays are just around the corner. It’s a good time to look back on 2024. It’s been a busy year—full of challenges, exciting updates, and plenty to celebrate. 

This year, NordLayer turned 5! We earned a few critical cybersecurity awards and were top-rated in our partner survey. Today, we have customers in 118 countries. That’s a great reminder of why we do what we do.

Along the way, we introduced features that make staying secure even easier. As always, we’ve worked hard to improve what we offer to our customers.

Thanks for being part of our journey. Here’s to wrapping up 2024 on a high note—and to an even brighter, safer 2025!

Donatas quote

A snapshot of NordLayer’s 2024

A quick look at 2024

NordLayer turns 5

NordLayer started in 2019 as a VPN tool to secure remote work. When COVID-19 hit, businesses faced new challenges. We had to onboard hundreds of employees quickly, ensuring secure connections and business continuity. It was a tough test, but we overcame it, protecting businesses around the world.

As remote and hybrid work took off, NordLayer became more than just a VPN. We grew fast. We added new security features and focused on the Zero Trust model, improving our customers’ security.

This year, as we celebrate our fifth birthday, we’ve become a comprehensive network security platform. In 2024, we launched several new features and improvements, with more to come.

Top rated by our partners

In 2024, we brought 450 new partners (1000+ in total) on board, expanding our network across 40 countries.

Partner survey results

Last year, MSPs and our partners faced challenges related to strict compliance regulations and rapid tech changes. We ran a survey to see how we’re helping, and our partners gave us a 9/10 rating.

Our partners appreciate how easily NordLayer fits into their workflow, fast and reliable support, and the chance to grow revenue—all while keeping their clients safe.

Donata quote

Our customer stories

NordLayer now has more than 9,000 customers in 118 countries. We’ve gathered feedback from many of them, and their stories show how our solutions help them stay secure and efficient.

Customer quotes

New features and improvements in 2024

Here’s an overview of the new features and product improvements we made in 2024. Each makes network management easier and more efficient while boosting security. We have also added new locations to the NordLayer VPN server network.

Product development timeline

At the beginning of 2024, we added Active Session Timeout, a new feature and made one improvement to the Zero Trust Network Access (ZTNA) segment. How does it benefit users?

Features 5

We’ve also introduced a few new features to enhance network security and performance.

Features 6

With five new dashboards in the Control Panel, IT admins can get more insights and make network management easier.

Dashboard

Brave browser users can enjoy smooth performance with full support for the NordLayer Browser Extension. We’ve also improved the Site-to-Site feature, giving IT admins better visibility into site-to-site tunnels and the ability to make real-time adjustments in the Control Panel.

The last feature released in 2024 is Download Protection. It scans newly downloaded files for malware and provides instant reports on any threats or user activity, ensuring real-time protection.

Awards and events

It was a big year for NordLayer. We won the UK Business Security Award for the Outstanding Cybersecurity Solution 2024 category, and Tekpon announced NordLayer as the Top Cloud Security Software Tool.

We also earned a Cybersecurity Excellence Award for Network Access Control. Competing with over 600 entries, this award highlights how NordLayer makes network security simple and reliable for businesses. And we’re not stopping there—we’ll keep pushing to make our solutions better.

Povilas quote

In 2024, the sales team stayed busy, attending 18 events across the USA and Europe. They connected with partners, showing them why NordLayer is a go-to name in security.

Photos from events

From work to play: how we build teams

Workation

At NordLayer, we know the best teams are built through shared experiences. With 1,300 people from 22 countries, our workstations mix work and fun. We work together, but we also relax and enjoy each other’s company.

These moments recharge our batteries for the upcoming challenges and help us build stronger connections. For us, it’s not just about working hard but also about having fun and growing together.

What’s next for 2025?

We’ll keep improving and expanding our network security SSE-based solutions. More features and product improvements are on the way. But what’s next for 2025? Stay tuned!

Andrius Buinovskis quote
 

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Delivering business security with extended prevention

Essential security can take care of most threats – but for businesses with larger networks, it might be time to extend the security envelope.

We’ve written before about how multilayered security is key to protection success. Each layer represents a dimension of protection, tackling specific threats or attack vectors.

The best security solution should tackle all of this behind the scenes, only requiring human attention during setup, audits, or incidents. Security should be comprehensive, yes, but not too complicated, worsening the protective power of security operations.

To learn how complicated security tools can impact a business’s cybersecurity protection, read our blog on alert fatigue-induced burnout.

Moreover, the larger such an operation is, the harder it is to cover. Thankfully, some measures can alleviate such issues easily – such as automatic extended protection.

What do we mean by extended protection?

Let’s start from the bottom – the core of a security operation: endpoint protection, covering computers, mobile devices, and servers. Such points of convergence between users and digital networks are prime targets for threat actors, necessitating constant safeguarding.

Baseline endpoint protection should serve the smallest businesses, but larger ones might find that this is just not enough to cover their use of various cloud and mail apps, authentication, or a potential cyber insurance ask in the form of advanced encryption. Furthermore, larger businesses also require advanced threat defenses, somewhere beyond stand-alone endpoint security. This could be a protective sandbox set up to catch any incoming malicious samples, such as zero-day threats, before they hit the endpoint itself, or vulnerability and patch management to take care of exploitable gaps before they become an issue.

At ESET, we call all this extended protection – as it extends beyond endpoint security, adding additional protective layers, extending prevention efforts.

Why should a business want extended security tech?

The easy answer to why a business should seek extended protection is that their involvement in commerce is enough of an incentive for threat actors to have them in their sights. Based on various reports, cracking the security of SMBs and larger businesses is the most likely goal rather than well-defended enterprises (a business with fewer than 100 employees could face 350% more attacks than enterprises).

Ransomware, a threat likely faced by every business entity, has seen a 32% rise in H1 2024 compared to H2 2023, based on ESET threat telemetry, with most detections present in the US, Mexico, the UK, and Germany.

Moreover, similar trends are seen in remote desktop protocol (RDP) password-guessing attempts (a rise of 33%), with numerous detections in additional countries like the US, Brazil, Spain, France, Italy, Germany, Czechia, and Poland. Shockingly, despite numerous return-to-office mandates, the now common use of RDP for remote employees in hybrid work has seen the incidence of attacks continue to rise.

ESET telemetry also highlights the diversity of popular vulnerable external network intrusion vectors. While password guessing is highly represented statistically, it is followed by Log4j, Struts, and various other vulnerabilities, targeting RDP or VPN apps.

Márk Szabó

Most of the represented intrusion vectors concern key business apps that are used globally. Additionally, a majority of the represented Common Vulnerabilities and Exposures (CVEs) have patches. Despite this, they are still being actively exploited – meaning that businesses are not patching their tools, creating major opportunities for threat actors.

How to ensure extended protection

To ward off threat actors abusing a diversity of vectors, let’s tackle extended network needs step by step:

Advanced threat defense

To give additional protection against new and unknown threats, advanced defense is a good idea. In this case, it is done by adding a cloud filter on top of endpoint security, creating a sandboxed environment, such as with ESET LiveGuard Advanced, that can perform in-depth behavioral analyses to prevent targeted attacks, such as ransomware or attacks via the supply chain. This effectively places defenses outside a corporate network, preventing threats from executing inside.

Cloud and mail

Think of the sort of collaborative cloud and mail apps you use (Teams, OneDrive, Gmail, SharePoint), and consider how they enhance a network and connect it to points outside the premises of your organization – leading to extended collaboration opportunities.

As explained by ESET Security Writer Roman Cuprik, large cloud platforms have seen rapid growth, accounting for as much as 280 million users – inviting malicious actors to abuse them for gain. For example, GIFShell enabled threat actors to misuse MS Teams for phishing, executing commands to steal data using GIFs.

Therefore, protecting the cloud and mail through solutions such as ESET Cloud Office Security and ESET Mail Security is an easy way to prevent abuse, as they actively scans all files at all points of their life in the cloud – stopping spam, malware, phishing, and other threats early.

Authentication

It was previously mentioned that password-guessing attacks are quite common. Passwords themselves are often not enough to ensure account security, either because they have been leaked as part of a security breach or because of their simplicity, becoming easily brute-forced.

Thus, secure authentication adds a layer on top, preventing password misuse from letting attackers gain access to user accounts. This is very useful also in the case of RDP and VPN security, as those are also easily compromised through credential misuse. With authentication, though, security is ensured by the provision of one-time-use, time-limited codes or tokens, as attackers would need access to this factor to verify their access attempt.

Encryption

A basic compliance and cyber-insurance ask is encryption. Most often associated with data at rest (storage), encryption prevents physical exploitation of endpoint devices in case a computer, for example, is stolen. Encryption also minimizes risk stemming from data breaches, as specific solutions such as ESET Full Disk Encryption make sure that data are protected at all times.

Vulnerability and patch management (V&PM)

Known vulnerabilities (CVEs) present a major exploitable attack vector, open to abuse by malicious actors. CVEs can be present both in apps and OSs, which is why security updates exist to tackle any vulnerability gaps.

However, some businesses forget or don’t do this, leading to data breaches due to negligence. This can be followed by denied insurance claims and compliance-induced fines for not dealing with known security gaps. To prevent such cases comprehensively, think about obtaining a V&PM solution with automatic updates that satisfies this need in the background.

(Ex)tending your security

Extended security doesn’t mean extending security resources. Most of the previous solutions don’t require manual adjustments apart from initial setup, as the greatest thing about automation these days is its quiet but significant impact.

Think of it as a cardboard box – while the foil and soft particles (multilayered security) inside protect the integrity of your purchased product (endpoint), extended protection plugs any voids (vulnerabilities), tapes over the edges (encryption) and puts a cargo truck between the box and the outside world (advanced threat defense) to protect it from direct damage. As for authentication, every delivery must be signed for. 🙂

For more information on how multilayered endpoint security serves as a powerful core of business protection, read our blog posts on Fileless malware and UEFI bootkits.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Biggest data breaches of 2024

Summary: Data breaches in 2024 soared, with record-high costs and over 1 billion records exposed. Learn what caused it.

The modern economy runs on data. Businesses thrive based on how they collect, analyze, and use customer data. But none of that matters if you drop the ball on cybersecurity.

Data breaches are a hot topic with C-Suite leaders, IT journalists, and customers. That’s no surprise. 2023 was bad, but 2024 has been one of the worst years yet on the cybersecurity front.

An average data breach now costs $4.9 million. Ransomware costs an average of $5.2 million, and thieves have stolen over 1 billion records.

Even so, we’re not here to spread panic. As this list of 2024’s biggest data breaches shows, every breach has a cause and a solution. Good security practices will defeat most attackers, and it helps to learn where others have failed. But first, let’s talk about statistics.

Key facts about 2024’s data breaches

2024 has been another banner year for data breaches, with cybercriminals accelerating their efforts to steal and monetize confidential information. The stats below show that data theft is commonplace, and organizations face a challenging data security environment:

  • National Public Data (NPD) will probably be 2024’s biggest data breach. The mammoth breach potentially impacts 2.9 billion records, close to the most significant data leak ever.
  • Change Healthcare suffered the largest health-related data breach of the year, affecting over 100 million customer records. This could make it the largest healthcare breach in history.
  • The average cost of a data breach reached $4.88 million in 2024.
  • The cost of a data breach in cloud environments was even higher, averaging $5.17 million.
  • 40% of breaches involved data stored across multiple environments.
  • 68% of 2024 data breaches involved human errors, such as falling for phishing scams.
  • 14% of attacks involved security exploits, three times the 2023 total.
  • On average, organizations took 194 days to identify data breaches.
  • The average attack took 64 days to contain.
  • Meta (Ireland) was fined 91 million euros for exposing customer data, the largest GDPR penalty in 2024.
 

The biggest data breaches of 2024

A devastating data breach is a nightmare for customers and affected organizations. But breaches can have a positive side. Each incident is a learning opportunity. It’s easier to defend critical data when we understand the mistakes made by others and the tactics used by attackers.

With that in mind, let’s explore 2024’s biggest data breaches. New breaches hit the news weekly, but we will discuss these cases for years.

1. National Public Data (1.3 billion individuals)

This one could be 2024’s biggest data breach. Before this year, few people knew National Public Data, a subsidiary of Jerico Pictures, Inc., but the company is now notorious for data security failures.

In April, data broker USDoD listed a cache of NPD 2.9 billion records for sale on the Dark Web. According to Jerico, the exposed data is related to 1.3 billion individuals. With a sale value of $3.5 million, it’s easy to see why criminals targeted the data handling company.

Filings with the Maine Attorney General suggested a massive regulatory penalty was on the cards. To make matters worse, NPD users filed a civil action in August, alleging the breach was foreseeable and avoidable.

Before either case could proceed, Jerico Pictures filed for bankruptcy in October. The company lost customer trust and folded as a direct result of the NPD breach. While USDoD has been arrested, the data thieves remain at large.

What data types were involved? Almost everything. The 2.9 billion records included personally identifiable information (PII), historical addresses, social security numbers, and nicknames used by record holders.

How did it happen? The details are unclear. As far as we know, the data breach started in December 2023. A bad actor nicknamed SXUL targeted NPD servers using unknown techniques. The data started to circulate on dark web forums, ending up with USDoD in April.

 

2. AT&T (2 breaches, over 110 million individuals)

 

AT&T is so big that a data breach there affects almost everyone. Unfortunately, the telecommunications giant reported two significant data breaches in 2024.

The first was a historical hack dating back to 2022. During a six-month window, hackers extracted call and messaging data for 110 million customers. In this case, AT&T was partly at fault. The compromised data resided on servers maintained by hosting company Snowflake (itself listed later in a separate breach).

The other security incident emerged when 73 million customer records appeared on a data brokerage. Alongside identifiable information, the cache contained encrypted passwords to access AT&T accounts. Panicked by the disclosure, AT&T issued a rare force reset of over 7 million passwords.

What data types were involved? The Snowflake breach involved call and message metadata, not voice or text data. Even so, attackers could use metadata to determine user locations. The cache also included details of those contacted by AT&T customers, another useful identifier.

The second breach included sensitive personal information like full names, postal addresses, and phone numbers. It also featured the encrypted passwords we noted earlier. Combining the two sets could be very powerful in the hands of bad actors.

How did it happen? In the first case, thieves targeted Snowflake’s cloud storage infrastructure. Snowflake suggested that weak authentication processes caused the leak and that the UNC5537 hacking group was responsible.

The second AT&T data breach in 2024 is less clear. AT&T have not released information about the attackers or their mitigation processes. It looks like the password reset only happened after freelance security experts notified the TechCrunch website. Not a good look for AT&T’s internal team.

3. Patelco Credit Union (726,000 individuals)

Patelco is a Bay Area credit union that dates back to 1936 and manages over $9 billion in assets. That history almost ended in June 2024 when the company detected a significant ransomware attack.

The details of the massive data breach are sobering. The company’s initial fraud alert indicates a loss of 726,000 individual records and possible exposure of over 1 million records.

What data types were involved? The Patelco breach involves data about customers and current and former employees. Stolen data includes names, addresses, dates of birth, license numbers, and social security numbers. Credit reports and financial accounts were all put at risk.

How did it happen? According to Patelco, attackers entered the network on May 23 before accessing customer and employee databases on June 29. A ransomware attack then took down the credit union’s online banking, mobile app, and customer service centers, making it hard to resist their demands.

Two months later, the company notified regulators and customers. It also restored banking services after a damaging two-week break and provided support for customers needing an urgent credit report.

The perpetrators are unclear. However, the Dark Web ransomware gang RansomHub lists Patelco on their data brokerage and may have been responsible.

4. Community Clinic of Maui (123,000 individuals)

Attacks against healthcare organizations become more sophisticated yearly as hackers target sensitive personal information. This year, one of the worst attacks affected the Community Clinic of Maui (or Mālama).

According to the Clinic, threat actors accessed patient records between May 4 and May 7 this year. The ransomware attack took systems offline and directly impacted patient care.

The Clinic closed for two weeks, and nurses had to use paper charts for weeks after reopening. It took months to secure digital data and restore usual service.

What data types were involved? Regulatory filings suggest criminals stole social security number data, passport numbers, and names. Even worse, the attack exposed medical histories, biometric data, and financial account data (including CVVs).

How did it happen? Analysis indicates a group called LockBit mounted the attack, as the group announced responsibility in June. Attackers breached cloud storage systems, using ransomware-as-a-service agents to extract valuable data.

5. Infosys (8.5 million records)

Outsourcing company Infosys McCammish Systems announced a major breach on September 6, 2024, potentially affecting 6.5 million records.

According to filings, the attack dated back to late 2023, with attackers active between October and November. There was a long delay between data extraction and discovery.

The effects could be significant, as Infosys serves many massive financial and insurance partners. For instance, the breach exposed thousands of records from Wells Fargo and the Teachers Insurance and Annuity Association of America (TIAA).

What data types were involved? The Infosys breach involved insurance data, creating a critical identity theft risk. Data exposed included SSNs, birth dates, medical treatments, email passwords, state IDs, and driver’s license numbers.

How did it happen? LockBit took responsibility for the Infosys attack. The Russia-linked group implanted ransomware across the Infosys network, locking over 2,000 devices.

6. UnitedHealth (100 million individuals)

Cyberattackers continue to ruthlessly target healthcare companies, including some of America’s biggest operators. In February 2024, TechCrunch reported a breach at UnitedHealth that could impact 100 million customers.

Health and Human Services (HHS) received a filing in October 2024, and investigations continue. If the numbers are accurate, UnitedHealth could be the largest sensitive data breach in US history.

The attack targeted UH’s Change Healthcare payment processing system, deploying ransomware to take systems offline. The results have been crippling for providers reliant on UnitedHealth. Patients have experienced treatment and payment delays, not to mention the risks of identity theft.

What data types were involved? The attack exposed extremely sensitive protected health information (PHI). Records included medical histories, billing data, names and addresses, and financial accounts.

How did it happen? A ransomware collective called ALPHV/BlackCat executed the UnitedHealth attack. The group gained access to Change Healthcare systems, deployed ransomware, and extracted a $22 million bounty. Sadly, they failed to honor the agreement, taking a vast data hoard.

7. Young Consulting (950,000 individuals)

In August, news emerged of another enormous data breach. This time in the financial software sector. Software vendor Young Consulting admitted an attack in early 2024 had compromised almost a million records.

Between April 10 and 13, attackers freely explored the company’s network. They took full advantage, extracting data relating to a Young Consulting client, Blue Shield Insurance.

This was a major headache as Blue Shield is a HIPAA-covered entity. The threat actors subsequently sought to extort money from Young Consulting. Their extortion failed, and criminals made the data available via the Dark Web.

What data types were involved? The attack involved insurance information, including dates of birth, policy numbers, SSNs, and protected medical information like prescriptions and past procedures.

How did it happen? This is the crucial question. We know the attack was mounted by a ransomware group called BlackSuit. BlackSuit specializes in extortion attacks that access and encrypt data. The group posts this data on public websites until target organizations pay up.

8. Ticketmaster (40 million individuals)

In May 2024, data loss affected one of the world’s biggest entertainment companies. Ticketmaster admitted that thieves had extracted data relating to 40 million customers, making it one of the largest breaches in the entertainment sector.

The 1.3TB data haul included identifiable information and earned the attackers around $500,000 within weeks, which is not bad for a few days’ work.

What data types were involved? Attackers stole personal data, including customer names and addresses, payment data, and purchase histories. This unique information is a big deal as it can be used in identity theft and targeted phishing attacks.

How did it happen? Cyberattackers from the ShinyHunters group accessed the Ticketmaster network via a vulnerability in the customer service portal. They then searched for customer data and extracted everything they needed.

The initial vulnerability involved Snowflake’s hosting infrastructure. Attackers hijacked a cloud hosting account, gained access, and used hosting privileges to access a client database. This should concern any organization reliant on cloud hosting.

9. Evolve Bank (7.6 million individuals)

Finance is coming under intense pressure from cyberattackers, as the May 2024 Evolve Bank attack shows. The banking-as-a-service provider reported the security incident in July, describing a classic ransomware scenario.

Attackers accessed the bank’s network, extracted data, and threatened to sell it. When Evolve refused to pay, the cybercriminals followed through, exposing millions of accounts.

According to the bank, attackers did not directly access customer funds (a common feature of 2024 ransomware attacks). Experts attributed responsibility to LockBit, who has had a busy and productive year.

What data types were involved? LockBit always seeks certain data types above others. In the Evolve attack, exposed data included social security numbers, details of financial accounts, and postal addresses.

How did it happen? LockBit tends to launch attacks via ransomware-as-a-service kits. The attack method for Evolve is not known. In the past, LockBit has paid insiders to allow access, exploited VPN vulnerabilities, and compromised cloud infrastructure.

10. Dell (49 million customers and 10,000 employees)

Data breaches affect small startups and veteran companies alike. Few tech companies are as experienced as Dell. Nonetheless, the hardware giant fell victim to two catastrophic breaches in 2024.

In May, Dell admitted losing 49 million customer records between 2017 and 2024. According to the company, the attack did not include personal or financial data but did compromise personal addresses and purchase histories.

In September, a second incident emerged. This time, hackers extracted 3.5GB of confidential employee data.

This attack only affected 10,000 people, but the small number of victims is deceptive. Information about employees is invaluable for phishers seeking to compromise corporate assets. And the data extracted is exactly what they need.

What data types were involved? The first incident exposed previous purchases, home addresses, and customer names. Dell says that the attack did not involve financial data and SSNs.

The second attack included employees’ phone numbers and social security numbers, employee IDs, and their status. It also included data about partners, not just Dell workers.

How did it happen? Details are unclear. Most probably, threat actors posed as IT support, tricking staff into sharing VPN credentials. We know the incidents were revealed by a hacker named “grep,” who claimed to be selling personal data. Experts believe attackers gained access via Atlassian vulnerabilities.

11. Tile (66 million individuals)

Tile is a device tracking service that should improve user security. However, in June, the parent company Life360 admitted to a massive data breach involving Tile’s customer support platform.

Attackers followed the ransomware playbook, demanding a ransom from Life360. Life360 has not disclosed whether it paid.

What data types were involved? The good news is the breach did not include user location data. Unfortunately, hackers extracted customer names, home addresses, email addresses, and phone numbers.

How did it happen? Hackers used a previous employee’s credentials to access a Tile feature designed for law enforcement officers. This provided access to Life360’s data storage systems, potentially allowing attackers to extract personal information about every Tile user.

It appears that Tile lacked effective multi-factor authentication systems. The company may have failed to remove inactive accounts with administrative privileges, leaving the door wide open.

12. Snowflake (Unknown)

We’ve left Snowflake for last as it is like the “mother of all data breaches” in 2024. Snowflake is a major cloud data hosting company specializing in data processing and analysis. It has grown rapidly in the era of Big Data and AI. However, growth and cybersecurity may not be in sync.

As we’ve already seen, Snowflake was involved in some of 2024’s biggest corporate data breaches, including attacks on AT&T and Ticketmaster. In each case, a hacker known as UNC5537 claimed responsibility.

UNC5537’s task was shockingly simple. All it took to steal data from some of the world’s biggest companies was a few stolen credentials. What’s more, the stolen credentials weren’t fresh. Some had been on sale illegally for years.

What data types were involved? Everything. The attack extended to Ticketmaster, AT&T, Santander, AllState, Mitsubishi, and Anheuser-Busch.

How did it happen? Attackers accessed unencrypted user credentials on a Jira instance by exploiting an unsecured device. After that, they used the credentials to access Snowflake’s cloud environment. None of the stolen accounts had MFA enabled, making access simple.

Looking ahead: what might 2025 bring?

In 2024, we dealt with many types of cyber attacks. In 2025, we will most likely see more ransomware attacks, but against a new set of targets.

As the Snowflake attacks show, cloud deployments are a primary target. SaaS vendors need to strengthen their defenses and master access controls. That’s particularly important as AI becomes integrated into cloud operations.

The Snowflake attack exploited reliance on third-party data analysis resources. Many companies also rely on external partners to leverage LLMs and integrate with operational systems. These partners could easily become victims in 2025.

Whatever cybersecurity trends 2025 brings, now is a good time to improve your cybersecurity posture. NordLayer can help you avoid data breaches in the New Year and beyond. 

Our Business VPN and access management tools shield data, secure remote connections, and filter access requests. With our security solutions in your corner, such as traffic encryption and multi-factor authentication (MFA), you can avoid Snowflake-style vulnerabilities and ruin the chances of opportunist data thieves.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

SaaS data protection and backup leader Keepit secures $50M in funding to accelerate growth and product innovation

New funding will fuel Keepit’s global expansion and product innovation

Copenhagen, Denmark – December 16, 2024 Keepit, the world’s only independent, cloud-native data protection and backup provider, today announced a $50 million funding round, led by existing investor One Peak , and EIFO, the Export and Investment Fund of Denmark. This funding round marks the company’s third equity investment in the past four years, bringing total funds raised to approximately $90 million.

The latest investment underscores Keepit’s rapid growth and solidifies its position as a leader in SaaS data protection. The new investment will be directed towards expanding the company’s go-to-market efforts and fueling continued product innovation.

Keepit’s mission to provide a vendor-independent, dedicated infrastructure for SaaS data protection has resonated with a broad range of enterprise customers as its solutions already support 5 million users globally. With its latest funding, Keepit is poised to accelerate its global expansion strategy, prioritizing key markets like the US, Europe, and other high-growth regions, while bolstering Keepit’s network of partners.

Simultaneously, Keepit plans to intensify its focus on product innovation, advancing its cutting edge, cloud native solutions to empower organizations in safeguarding their SaaS data effectively and reliably. This will include broader workload coverage and additional data management and intelligence capabilities for the enterprise.

“Our commitment to innovation and solving our customers’ most pressing data protection challenges is what drives us forward,” said Morten Felsvang, Keepit Co-founder and Chief Executive Officer and Frederik Schouboe, Keepit Co-founder and Chief Vision Officer. “This new funding will allow us to expand our reach and continue innovating the most advanced SaaS data protection solutions on the market. We’re thrilled to see such strong support from our investors, who understand our mission and share our vision for the future.”

David Klein, Co-founder and Managing Partner at One Peak, commented on the investment:
“We have been continually impressed by Keepit’s leadership and their unwavering ability to deliver on their vision. In a time when the need for secure, independent SaaS data protection is more critical than ever, Keepit stands out as a leader with its innovative platform. We are thrilled to continue supporting the Keepit team in this exciting next chapter of their growth journey.”

Jacob Bratting Pedersen, Managing Director, Partner & Head of Tech & Industry at EIFO, commented:
“Keepit’s focus on cloud-native, vendor-independent data protection is what sets them apart. This investment is not just a financial decision for us—it’s about supporting a company that is revolutionizing the way organizations think about data security. We believe in their long-term vision and look forward to contributing to their continued success.”

 

About One Peak

One Peak is a leading specialist growth equity firm with $2.0 billion in assets under management that invests in technology companies in the scale-up phase. One Peak provides growth capital, operating expertise, and access to its extensive network to exceptional entrepreneurs, with a view to help transform innovative and rapidly growing businesses into lasting, category-defining leaders. In addition to Keepit, One Peak’s investments include Akur8, Ardoq, Coro, Cymulate, Deepki, Docplanner, Lucca, Neo4J, Pandadoc, Spryker, and many more.

To learn more, visit www.onepeak.tech.

 

About EIFO, the Export and Investment Fund of Denmark

EIFO is the national promotional bank and export credit agency of Denmark combined in one financial institution. Active in over 100 countries, and with a total business volume of more than EUR 20 billion, EIFO provides financial solutions for Danish companies and their global partners, while also investing in startups and funds. We exist to open doors for Danish global business, accelerate the green transition, promote new technologies and develop the Danish defense industry. With our willingness to take risks in financing, EIFO paves the way for those who dare to think bigger.

 

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

What Is Static Sentiment Analysis?

What Is Sentiment Analysis?

Sentiment analysis takes large volumes of data and uses natural language processing (NLP) to determine whether a body of text has a positive, negative, or neutral sentiment.

There are three main approaches to sentiment analysis:

  • Rules-based techniques: A group of words (lexicons) are classified in terms of tone. For example, a positive lexicon might include “secure” and “compliant,” while a negative lexicon might contain “insecure” and “non-compliant.”
  • Machine learning (ML)-based techniques: These techniques use algorithms trained to determine sentiment based on words appearing in blocks of text and the order in which they appear. The ML learns and improves as more data is ingested.
  • Hybrid techniques: This combines rules-based and ML approaches to balance speed and accuracy based on the use case.

In a talk by Perforce Principal Software Engineer Alex Celeste at Embedded World, Celeste introduced the concept of static sentiment analysis, which combines sentiment analysis and static analysis.

What Is Static Sentiment Analysis?

Static sentiment analysis takes the concept of sentiment analysis and combines it with static analysis. Static sentiment analysis uses machine learning (a small-language model) to analyze code and determine developer intent.

In other words, static sentiment analysis could determine whether the code does what a developer meant for it to do.

As artificial intelligence and machine learning technologies advance, they can help automate the software development process by adding a new dimension to testing and save development teams time and effort.

More on Static Sentiment Analysis 

Explore how static sentiment analysis works, its benefits, and how static sentiment analysis complements static analysis best practices in our new eBook.

Challenges of Traditional Testing in Software Development

Traditional software testing isn’t enough in today’s complex digital landscape, especially with the introduction of AI and ML.

Manual testing and manual code reviews slow down the development cycle and introduce a higher risk of human error. Currently, teams using static analysis tools — like Perforce Helix QAC and Klocwork — are automating the process by detecting bugs, code vulnerabilities, and compliance issues early in development.

But while traditional techniques like static analysis perform well against “hard” criteria like syntax errors, buffer overflows, and quantifiable rules in coding standards, they can miss “soft” criteria like developer intent. That’s where static sentiment analysis comes in.

Developers may soon be able to bridge the gap between intent and implementation by taking a static sentiment analysis approach.

How Does Static Sentiment Analysis Work?

Static sentiment analysis analyzes an abstract representation of code to determine if a test section is significantly different from a reference sample in the same code base. These differences could be changes in a developer’s style, code clarity, or misapplied design patterns.

A successful static sentiment analysis would not just detect the pattern of the structure — it would need to identify instances where the test section is sufficiently different from a reference sample and raise a flag.

To break it down further, static sentiment analysis determines the mathematical distance between the entropy of a test feature and a reference sample. The distance measures the similarity between features, and entropy evaluates the feature’s information. A significant increase in the distance between features indicates an unexpected change in style, which may require further investigation.

How Static Analysis and Machine Learning Level Up DevOps Workflows

The promise of static sentiment analysis allows developers to identify where developer intent went amiss in code and better fulfill the needs of customers and industry standards.

While static sentiment analysis is still in the research phase, static analysis is currently helping DevOps teams shift left and increase developer productivity.

Static code analyzers Helix QAC and Klocwork help reduce technical debt by:

  • Finding and fixing coding issues earlier
  • Improving overall software quality
  • Quickly inspecting millions of lines of source code (legacy and new code)
  • Enforcing coding standards compliance
  • Prioritizing risk and analysis results.

With the introduction of static sentiment analysis, DevOps teams could even further level up their workflows by also automatically checking for instances where developer intent may have been missed — greatly reducing the time and effort required for exhaustive functional testing.

In the meantime, there’s a lot you can do to level up now. See for yourself how Perforce Static Analysis helps accelerate development. Sign up for your free 7-day trial today.

About Perforce
The best run DevOps teams in the world choose Perforce. Perforce products are purpose-built to develop, build and maintain high-stakes applications. Companies can finally manage complexity, achieve speed without compromise, improve security and compliance, and run their DevOps toolchains with full integrity. With a global footprint spanning more than 80 countries and including over 75% of the Fortune 100, Perforce is trusted by the world’s leading brands to deliver solutions to even the toughest challenges. Accelerate technology delivery, with no shortcuts.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Portnox Awarded 2024 IT Cybersecurity Excellence Award

Portnox Cloud closes 2024 with another award win for innovation in zero trust and access control.

 

Austin, TX – Dec. 19, 2024—Portnox, a leading provider of cloud-native, zero trust access control solutions, today announced that TMC has named Portnox Cloud a recipient of the 2024 IT Cyber Security Excellence Award.

TMC announced the 2024 winners in a press release on its website last week. According to TMC, this award highlights not only the technologies used but also best practices for successfully deploying cybersecurity solutions.

Network access control solutions often face criticism for being difficult to deploy, complex to manage, and expensive to maintain. Portnox Cloud addresses these issues as a cost-effective unified access control (UAC) solution that delivers passwordless authentication, access control, risk mitigation, and compliance enforcement for enterprise networks, applications and infrastructure. Additionally, as a fully cloud-native platform, Portnox Cloud eliminates the need for costly on-site appliances and on-going systems maintenance.

“Receiving the 2024 IT Cybersecurity Excellence Award from TMC is a proud moment for the entire Portnox team,” said Denny LeCompte, CEO of Portnox. “Portnox Cloud exemplifies our commitment to pioneering innovations that address the evolving access control and cybersecurity challenges across today’s dynamic IT environments while ensuring a seamless user experience for our customers.”

“Congratulations to Portnox for being honored with an INTERNET TELEPHONY Cybersecurity Excellence Award for innovation in IP communications,” stated Rich Tehrani, CEO, TMC. “The Portnox Cloud has demonstrated outstanding quality and has delivered exceptional, measurable, tangible results for its users. Not only do I look forward to seeing their future successes, I thank them for protecting their clients from crippling attacks.”

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Year in review: take a look back at 2024 with NordPass

Accolades and recognitions

We’re not ones to rest on our laurels, but there’s no harm in being proud of our wins from time to time. This year, our success was powered by industry recognition and our very own knowledge sharing that spread across the globe. So, let’s start this year in review by taking a minute to recognize what we’ve achieved in 2024. 

asset badges

PCMag Editor’s Choice and Globee Awards

This year, we had the honor of being selected as PCMag’s Editors’ Choice and taking the top spot as the Best Premium Password Manager for 2024. NordPass’ ease of use, slick design, and additional cybersecurity features like Password Health and Data Breach Scanner were highlighted as some of the standouts of our product.

We also received two silver awards at the prestigious 20th Annual 2024 Globee Awards for Cybersecurity back in March. NordPass was recognized in the Password Management and Passwordless categories for its innovations in the password security field.

CNBC’s best password manager pick

We’re always happy to be recognized for our efforts to put security first, and we hope to raise the bar even higher next year. This year, CNBC Select created a list of the top 8 password managers on the market, with yours truly coming out on top. NordPass was noted for its strong XChaCha20 encryption, ability to store unlimited passwords and other sensitive data, and its multi-factor authentication support.

top 200 passwords

Top 200 Passwords

Over the years, the NordPass Top 200 Most Common Passwords list has become a tradition. For the sixth year in a row, NordPass has analyzed password usage trends across the globe to determine which login credentials are most commonly used—making them an easy grab for cybercriminals to test.

The top combinations included the likes of “123456” and “secret”. News about these password practices spread far and wide—our study was shared by over 2,000 media outlets across the globe, including The Late Show With Stephen Colbert, The Guardian, and The Wall Street Journal. This time next year, we hope to see this year’s leading password combos far less frequently.

Industry expertise

We’re passionate about knowledge sharing and learning from the very best, whether it concerns compliance policies, technological developments, or future threats. Here are a few of our favorite knowledge-sharing moments from 2024.

The NIS2 Directive—legislation aimed at raising cybersecurity standards across all member states and improving their preparedness to deal with cyber incidents—officially took effect on October 17, 2024. NordPass has put together a practical handbook to help ensure your organization’s policies meet NIS2 compliance requirements with ease.

 

Andew Shikiar and Adrianus Warmenhoven

Another big topic on our minds was passwordless technology. NordPass CEO Jonas Karklys had the opportunity to sit down with Andrew Shikiar, Executive Director and CEO of the FIDO Alliance, to learn more about how passkey adoption has been progressing and how this technology can adhere to global compliance standards.

Finally, if there’s one tech trend we couldn’t escape this year, it’s AI. Whether it’s generated content, chatbots, or even scams, AI seems to be playing a key role in the process. We were lucky enough to ask Adrianus Warmenhoven, NordVPN’s cybersecurity advisor and spokesperson, how AI may help out hackers in the near future during his visit to our offices in Vilnius.

Feature updates

The cybersecurity landscape is far from a smooth ride, and we’re making sure we stay on track by continuously bringing you new and improved features. Here are just a few of the major changes, reintroductions, and debut features from NordPass’ 2024 timeline.

lime limited sharing

All things sharing

Sharing credentials in the workplace is often impossible to avoid. Whether you’re onboarding new team members, saying goodbye to those leaving, or simply need to share access with colleagues before your vacation, your credentials must remain secure. That’s why one of our goals this year was to bring you a safer and more convenient way to share credentials.

Welcome to the new Sharing Hub, a new feature within the Admin Panel that allows Owners to view all shared items within and outside the organization. Sharing Hub lets you see which employees have access to which credentials, who shared what, and which access level is set. You can learn more about Sharing Hub in our dedicated blog post.

Speaking of sharing access, we’ve made some big improvements here as well, allowing you more flexibility and control over what you share and how. We’ve introduced new access permission levels, so you can choose whether you want to let other users autofill, view, share, or edit shared credentials. You can also now restrict access with Time-Limited Sharing. You can toggle this setting to limit access to the shared password or other data from 1 hour to 1 month.

exposed passwords

Find your exposed passwords quickly

We recommend routine password status checks to everyone. The Password Health feature on NordPass has always let you see which of your passwords are weak or reused. This year, we’ve brought another category to the list: Exposed Passwords.

This category shows if any of your passwords have been involved in a data breach. Unlike our Data Breach Scanner, which checks your email address against leaked data on the dark web, Exposed Passwords looks for your passwords specifically. Learn how to use Exposed Passwords in the dedicated FAQ.

autofill autosave

Autofill and autosave improvements

Autofill and autosave are so essential to a password manager that you’d think their potential has been fully explored. But that’s far from the truth—there are still many tweaks and improvements to be explored and implemented. We’ve worked hard this year to deliver an improved autofill and autosave experience for our users.

This year, we focused on refining some of autofill’s core features. To start, NordPass can now recognize the subdomains of web addresses and match them to those linked to your saved credentials. This saves users the hassle of manually looking for the right login details when the password manager couldn’t detect them automatically.

Next, we expanded the website storage capabilities. You can now add an additional website to the credentials in your vault, eliminating the problem of duplicate credentials. We’ve also introduced a new feature that adds more granularity to the autofill and autosave settings. It allows users to decide which specific credential types NordPass’ autofill and autosave should ignore on either all websites or selected ones. Learn how to configure autofill and autosave in our dedicated guide.

Finally, we aimed to make your login experiences quick and seamless by introducing Instant Login. Whenever you visit a website, NordPass will prompt you to use your stored credentials and proceed with the login with just one click.

authenticator autofill

Making MFA convenient with the NordPass Authenticator

You know the drill—if you want your accounts secure, a password alone won’t cut it. We’ve long since crossed the border between multi-factor authentication being a nice-to-have, and a must-have. The problem is that for many users, setting up and using multi-factor authentication is a hassle.

We’re all about keeping it simple, though. That’s why we’ve launched NordPass Authenticator on the browser extension for our Business users, following last year’s mobile launch. Our patented Authenticator allows you to store and generate time-based one-time passwords directly in NordPass, without relying on third-party apps. Don’t worry about your one-time codes being easily perceived—NordPass uses biometric authentication to amp up access security.

Better yet, NordPass autofills these one-time codes for you, saving you time and eliminating the struggle of a code expiring before you submit it. Learn more about NordPass Authenticator in our blog post.

email masking

Build your own secret identity with Email Masking

Has your inbox ever been suddenly swarmed with suspicious offers from unknown senders after signing up for a service or completing a purchase? The culprits are websites that sell your information or are breached, exposing your email address to more unauthorized eyes than you’d like and making it a target for social engineering campaigns.

To tackle this problem, we launched Email Masking—a service that allows you to create a decoy email address and synchronize it with your real one. You can use your email mask to sign up for online shopping, subscribe to newsletters, or, if you need it for work, test rival services without showing your hand. Learn more about Email Masking and how to set it up.

data breach scanner

Data Breach Scanner: better than ever

The year 2024 started with a bang when the largest data breach ever, known as the Mother of All Breaches (MOAB), involving over 12 terabytes of data, was discovered. Its scale had many users wondering: has my data been breached?

Data Breach Scanner gives you the answer in no time—and this year, we made sure it could check your financial details, too. Just add your email addresses and credit card details to the Data Breach Scanner, and it’ll alert you whenever it finds a data match on the dark web. We’ve also improved the overall user experience, ensuring businesses and individuals alike can keep an eye on their data. Read on about the updated Data Breach Scanner in our blog.

vanta integration

APIs and integrations

There’s no all-in-one cybersecurity tool that can fix all your business problems, but an integration or two can always help. That’s why, this year, NordPass added more integrations with data management and ID provisioning services to grant your organization a more well-rounded and convenient security toolkit.

  • Entra ID and Okta user provisioning – organizations can provision employees using Entra ID and Okta access management solutions.

  • Splunk® – NordPass customers who use Splunk® can receive automated activity analysis and generate reports for simpler data visualization.

  • VantaVanta’s API integration with NordPass helps organizations automate compliance workflows by synchronizing active members’ data.

Additionally, NordPass has launched the Activity Logs API. Using the API, organizations’ Admins can extract the full activity log information to monitor employees’ actions and investigate company-wide activities for potential risks. Learn more about the Activity Logs API in our guide.

MSP zone

Let’s take a minute to talk about our managed service providers (MSPs). While their customers get to enjoy all the updates and enhancements we’ve just covered, we dedicated time to making NordPass management simpler for our MSP partners, too.

ConnectWise PSA™ integration and open API

This year, we launched a new integration with ConnectWise PSA™. This integration allows MSPs to optimize workflow and generate usage reports. It provides daily and monthly usage information of all MSP-managed organizations. Read our blog post to learn more about the ConnectWise PSA™ integration.

Organizations that don’t use ConnectWise PSA™ can still access NordPass’ open API to have license usage data sent directly to their systems. Our dedicated guide provides more details about setting up the Provider API.

Automatic billings are finally here

We understand that manual monthly payment management can be a headache for MSPs. To alleviate this pain, we’re happy to finally introduce automatic billings for our direct partners. They can now add their billing details directly in the MSP Admin Panel to set up seamless automatic payments based on the monthly usage data.

Resource hub for MSPs

We hope to make the NordPass onboarding process smoother and more accessible for our MSP partners. For this, we’ve launched a new Resources page on the MSP Admin Panel containing all the key information, useful materials, and support contact details to assist with getting started with NordPass.

New launches

2024 in Nord Security has been the year of launches. By now, you’ve probably heard the likes of Saily and NordStellar. Likewise, things were brewing in the NordPass kitchen, cooking up new everyday essentials to simplify passkey use and track company data breaches. Let’s place the final cherry on our end-of-year cake and see what Authopia and Dark Web Monitor are all about.

authopia

Authopia

Authopia is one of the biggest projects the NordPass team has launched this year. This tool lets you easily add a passkey widget to a login form on any website or service, creating an effortless and accessible passwordless login experience.

Authopia is a simpler way to implement passkeys in organizations, as it has very minimal coding requirements. It’s also completely free, meaning that you can easily adopt it whether you’re a small business, a nonprofit, or a global enterprise. Learn more about Authopia’s vision and mission from Sorin Manole, Head of Product, R&D at NordPass.

dark web monitoring

Dark Web Monitor

With tens of terabytes of stolen data out there on the dark web, protecting businesses is as important as ever. And what better way for organizations to fend off threats in the dark than by shining a light directly on them?

Dark Web Monitor, powered by NordStellar, is a free tool that scans the dark web for your organization’s domains. Simply enter your company email address, and Dark Web Monitor will detect whether it has appeared in a data breach and, if so, which data has been affected and how serious the breach is.

So, what’s next?

As you can see, this year has kept us pretty busy, but we’re not slowing down our pace—on the contrary, we’re only getting started. Although we’re leaving this exciting chapter behind, we’re already eagerly looking forward to what 2025 has to offer.

We’ve got some big news to share with you in the near future—in fact, you might already notice some sneak peeks if you look closely. Make sure to stay tuned and go beyond the limits of password security with NordPass.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Guardz Appoints Esther Pinto as CISO to Lead Security and Drive Innovation

Guardz is proud to announce the appointment of Esther Pinto as its new Chief Information Security Officer (CISO). Esther’s extensive background in cybersecurity, combined with her leadership and commitment to fostering inclusion and diversity, positions her as the ideal choice to further strengthen Guardz’s focus on security and innovation.

This strategic addition comes at a time when cybersecurity challenges continue to evolve, underscoring Guardz’s commitment to not only keeping pace with threats but also leading the charge in empowering Managed Service Providers (MSPs) to protect small and medium-sized businesses (SMBs).


Esther Pinto: A Visionary Cybersecurity Leader

Esther Pinto brings a wealth of experience from her work in shaping and implementing robust cybersecurity programs. She has led transformative initiatives at companies like Anecdotes, where she served as CISO and Head of Information Security, and AppsFlyer, where she developed and scaled their Information Security operations.

Her passion for creating secure environments that foster innovation has been a hallmark of her career. Esther is dedicated to advancing security programs that go beyond just protection—they are designed to inspire confidence, enable growth, and drive technological progress.

“Joining Guardz as CISO is a huge opportunity to shape the future of cybersecurity in an organization that’s leading the charge in empowering MSPs to defend SMBs from ever-evolving cyber threats,” said Pinto. “I’m driven by the challenge of building cutting-edge security programs that not only protect but also inspire innovation, and I’m excited to be a part of the exceptional team at Guardz.”


Strengthening Guardz’s Commitment to Security and Innovation

Esther’s appointment marks a significant milestone for Guardz, highlighting the company’s relentless dedication to maintaining security as the foundation of its mission.

“Esther’s arrival as CISO is a testament to Guardz’s commitment to excellence and innovation in cybersecurity,” said Dor Eisner, CEO and Co-Founder of Guardz. “Her unparalleled expertise, leadership, and vision will be instrumental as we continue to develop AI-powered solutions that protect SMBs and drive success for MSPs. We are thrilled to have her on board and look forward to the transformative impact she will bring.”

As CISO, Esther will lead efforts to secure Guardz’s internal operations, enhance product security, and drive new security strategies that align with the company’s rapid growth. Her role will be pivotal in ensuring Guardz remains at the forefront of cybersecurity innovation while continuously prioritizing the safety and success of its customers.


The Road Ahead: Building the Future of Cybersecurity

Esther Pinto’s leadership aligns with Guardz’s core mission to empower MSPs with advanced cybersecurity tools to protect SMBs against an ever-changing threat landscape. Her expertise will play a vital role in shaping the company’s next evolution of security initiatives, including:

  • Enhancing Product Security: Driving the development of innovative features and security protocols to ensure Guardz products meet the highest standards of safety and reliability.
  • Scaling Operations Securely: Implementing robust measures to safeguard Guardz’s own operations as the company continues its global growth.
  • Inspiring Innovation: Leveraging her expertise to create security solutions that not only mitigate risks but also foster creativity and technological advancement.

Through Esther’s leadership, Guardz is well-positioned to continue delivering cutting-edge AI-powered solutions that simplify cybersecurity for MSPs and provide unparalleled protection for SMBs.


Esther Pinto’s appointment as CISO represents more than just a leadership addition—it’s a statement about Guardz’s unwavering dedication to security and innovation. With her vision and expertise, Guardz is poised to achieve even greater success in empowering MSPs and safeguarding the businesses they serve.

Welcome to Guardz, Esther Pinto!

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.