Skip to content

Joseph Rodriguez Joins Portnox as Chief Revenue Officer

Austin, TX – May 14, 2024Portnox, a leading provider of cloud-native, zero trust access control solutions, today announced that Joseph Rodriguez has joined the company as Chief Revenue Officer (CRO), reporting to CEO Denny LeCompte.

Joseph will lead revenue operations with responsibility for worldwide sales. He will continue to grow the sales team and ensure members of the sales organization around the world are supported with robust sales enablement and sales execution efforts. Both North America and EMEA will continue to be strategic focus areas of opportunity for Portnox.

“Joseph brings genuine enthusiasm and caring to every interaction, and is driven to exceed expectations, and lead by example,” said Denny LeCompte, CEO of Portnox. “With extensive experience and knowledge in mid-market and enterprise B2B software sales, we have confidence that he will help us meet and exceed our revenue goals.”

With over 20 years of SaaS Enterprise sales and Go-to-Market experience, Joseph recently held revenue leadership positions at Spredfast (now Khoros) and Upland Software. He served as SVP of Worldwide Sales at Upland, and Vice President Sales, North America, at Khoros.

“Portnox offers companies the tremendous opportunity to strengthen their organizational security posture with critical zero trust access control policies that can be deployed and maintained with ease,” said Rodriguez. “I’m excited to work shoulder to shoulder with our incredible sales team to deliver unprecedented revenue-growth, expansion, and retention.”

About Portnox

Portnox offers cloud-native zero trust access control and cybersecurity essentials that enable agile, resource-constrained IT teams to proactively address today’s most pressing security challenges: the rapid expansion of enterprise networks, the proliferation of connected device types, the increased sophistication of cyberattacks, and the shift to zero trust. Hundreds of mid-market and enterprise companies have leveraged Portnox’s award-winning security products to enforce powerful access, endpoint risk monitoring and remediation policies to strengthen their organizational security posture. By eliminating the need for any on-premises footprint common among traditional information security systems, Portnox allows companies – no matter their size, geo-distribution, or architecture – to deploy, scale, enforce and maintain these critical zero trust security policies with unprecedented ease.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Is your company data on the dark web? Key webinar takeaways

Cybersecurity experts Vladimir Krupnov, Threat Intelligence Lead at Revolut, Andrew Rose, Chief Security Officer at SoSafe, and Matt Lee, Senior Director of Security and Compliance at Pax8, joined Gerald Kasulis, VP Sales at NordStellar, to share their experiences and insights on dark web monitoring, and how they leverage threat intelligence to secure their organizations’ data. Enjoy the recording above for its comprehensive discussion on the topic, or keep reading for key business takeaways.

Understanding the dark web

The dark web refers to parts of the internet that are not indexed by typical search engines and require specific browsers or tools to access. According to Matt, it is “where data has been traded… where a lot of criminal business has historically been transmitted.” To Vladimir,  “It’s a cyberspace where criminals – or potential criminals – communicate and carry out malicious activity, which could be related to your company, government, or anything else.”

But as Andrew points out, it’s not all doom and gloom. The dark web has proven time and again to be a beneficial technology, providing a vital platform for journalists and social movements across the world for free speech and anonymous communication.

For security leaders, it’s a vast, largely untapped wellspring of information and data that isn’t attainable on the clear web. Fearing or ignoring it as a large business equates to simply wasting a good source of intelligence and/or value.

Quote bubble: “You have to embrace the dark web as well as fear it, because it might be serving your business, your community or your social group, not just endangering your business.”

So why do cybercriminals flock to the dark web? According to Matt, it offers threat actors a way to “control the discoverability” of illegal activities, leveraging end-to-end encrypted technologies for anonymity. Vladimir points out the ease with which individuals can now become cybercriminals, thanks to platforms like Telegram that host thousands of illicit groups: “this is a massive problem because it lowers the barrier for the typical person to become a cybercriminal. It just takes 2 clicks nowadays.”

What are they after?

Vladimir states that the point is not to be fully invisible, but to have an easy escape and lower traceability (compared to the “clear” web): “You can always find anyone… It all comes down to time and effort. If someone sells credentials belonging to your company and the existing damage is less than a few million, it’s unlikely to be picked up by law enforcement unless it’s a part of a broader campaign.”

Disposable fake profiles are a key tool in a threat actor’s arsenal. “They just burn the profile,” says Matt. “He would just say, they’re getting too close to me, time to burn my PGP key. Next I’ll just build a new profile. They’re living in plain sight. That said, they hate burning a persona. It sucks. But yes, they do it when they need to.”

Hacker gangs operate better than most think, he continues. “Their tradecraft and OPSEC (operations security) is better than most people give credit for, and I would also say is probably better than most companies’… it is the risk/reward of what they’re doing – since the risk is extremely high, they respond with better offset and better methodologies.”

Assessing and addressing business exposure

Matt Lee advises businesses to adopt a mindset of “live compromised,” focusing on limiting damage and improving incident response: “How do I limit the blast radius? How do I find it faster?”

This proactive stance can be supported by using threat intelligence services, as Andrew’s experience shows: “A threat intel firm brought me information about one of our staff members’ identities being sold online… We reached out immediately to that staff member and helped them close down all of those loops. We knew that although it was a personal issue for them, that could very easily turn into an insider threat, blackmail, or risk for us.”

Andrew explains that his team effectively scans for anything to do with their brand or company. In this case, it was a lucky find: “It just so happened that part of the details that were being sold said that this person is working for this organization in this role. So that was our trigger, that was our hook.”

He points out ethical concerns for business leaders when dealing with dark web resources. “You look at things like the Ashley Madison data dump… and we’re wondering what we do with this? Do we download this data and look at it to see whether any of our staff have been compromised and therefore potentially being blackmailed? Because that’s us downloading illegally stolen data. Or do we step away from it?”

Proactive measures and best practices for security leaders

Each expert supports ramping up education efforts and budget quotas for cybersecurity.

 

Business leaders, particularly newly hired executives, are singled out by threat actors with targeted phishing and vishing attempts, according to Vladimir, underscoring the need for comprehensive security protocols from day one.

What about “selling” to stakeholders and business leadership? As always, it comes down to communication. Andrew stated: “You have to take stories to your exec. Take my previous examples of finding at-risk employees online and being able to protect them, thus protecting the company. Or receiving a phone call from a threat intel provider, letting me know that there were discussions about attacking my sector. 

Should smaller companies be concerned about the dark web threats? There’s a common misconception that small companies are not a target for cybercriminals, with media exposure focusing on large scale data breaches of well-known brands. Matt Lee thinks so: “If I land on your credentials, your data, it doesn’t have to be valuable to me, it doesn’t have to be valuable to the world. It only has to matter to you to get you to pay.” Vladimir reminds us to watch out for fourth party risk – any risk posed to your organization from a business relationship a third party has with its vendor.

Insights and recommendations for threat exposure management

Matt recommends using canaries (attractive decoy targets for threat actors) as warning beacons on your security perimeter. “It enables you to take action, and makes that credential no longer valuable. Remove the credential, remove the persistence, whatever it may be.” A common question crops up: How can security leaders measure the effectiveness of dark web monitoring solutions? The panelists agree on measuring intelligence quality by how much of it their security teams can act upon.

Andrew looks at how current the data his solution is providing is, acknowledging that there are barren periods, but “it was never a service you could do without. Because you always knew that next month might be when suddenly they’d find something which could make the whole contract worthwhile.”

Matt agreed, saying it’s simply good strategy, relevant to sports, life, and cybersecurity: “You go scout the other team!”

Any final words? Incident response plan. If you don’t have one, Matt says, sort it out. “Too many companies lack this.” This plan should be reviewed annually and adapted to evolving threat and business environments. Ultimately, this is all about setting a strategic baseline for cybersecurity best practices. “Everything we’re talking about here is part of basic data hygiene and governance. Live as close to the CIS framework as you can.”

With actionable data, timely insights, and increased visibility into the online underworld, staying one step ahead of threat actors becomes possible. For CISOs protecting their organization’s data and security, this means having the ability to not just react to threats, but to anticipate them.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

ESET Research: Ebury botnet alive & growing; 400k Linux servers compromised for cryptocurrency theft and financial gain

  • ESET Research has released its deep-dive investigation into one of the most advanced server-side malware campaigns, which is still growing – Ebury group with their malware and botnet.
  • Over the years, Ebury has been deployed as a backdoor to compromise almost 400,000 Linux, FreeBSD, and OpenBSD servers; more than 100,000 were still compromised as of late 2023.
  • Ebury actors have been pursuing monetization activities subsequent to our 2014 publication on Operation Windigo, including the spread of spam, web traffic redirections, and credential stealing.
  • Additionally, ESET has confirmed that operators are also involved in cryptocurrency heists.
  • In many cases, Ebury operators were able to gain full access to large servers of ISPs and well-known hosting providers.

BRATISLAVA, MONTREALMay 14, 2024 — ESET Research released today its deep-dive investigation into one of the most advanced server-side malware campaigns, which is still growing and has seen hundreds of thousands of compromised servers in its at least 15-year-long operation. Among the activities of the infamous Ebury group and botnet over the years has been the spread of spam, web traffic redirections, and credential stealing.  In recent years it has diversified to credit card and cryptocurrency theft. Additionally, Ebury has been deployed as a backdoor to compromise almost 400,000 Linux, FreeBSD, and OpenBSD servers; more than 100,000 were still compromised as of late 2023. In many cases, Ebury operators were able to gain full access to large servers of ISPs and well-known hosting providers.

Ten years ago, ESET published a white paper about Operation Windigo, which uses multiple malware families working in combination, with the Ebury malware family at its core. In late 2021, the Dutch National High Tech Crime Unit (NHTCU), part of the Netherlands national police, reached out to ESET regarding servers in the Netherlands suspected of being compromised with Ebury malware. Those suspicions turned out to be well-founded and with NHTCU’s assistance, ESET Research has gained considerable visibility into operations run by the Ebury threat actors.

“Following the release of the Windigo paper in early 2014, one of the perpetrators was arrested at the Finland-Russia border in 2015, and later extradited to the United States. While initially claiming innocence, he eventually pleaded guilty to the charges in 2017, a few weeks before his trial at the U.S. District Court in Minneapolis was set to proceed, and where ESET researchers were scheduled to testify,” says Marc-Etienne M. Léveillé, the ESET researcher who investigated Ebury for more than a decade.

Ebury, active since at least 2009, is an OpenSSH backdoor and credential stealer. It is used to deploy additional malware to: monetize the botnet (such as modules for web traffic redirection), proxy traffic for spam, perform adversary-in-the-middle attacks (AitM), and host supporting malicious infrastructure. In AitM attacks, ESET has observed over 200 targets across more than 75 networks in 34 different countries between February 2022 and May 2023.  

Its operators have used the Ebury botnet to steal cryptocurrency wallets, credentials, and credit card details. ESET has uncovered new malware families authored and deployed by the gang for financial gain, including Apache modules and a kernel module to perform web traffic redirection. Ebury operators also used zero-day vulnerabilities in administrator software to compromise servers in bulk.

After a system is compromised, a number of details are exfiltrated. Using the known passwords and keys obtained on that system, credentials are reused to try logging into related systems. Each new major version of Ebury introduces some important change and new features and obfuscation techniques.

“We have documented cases where the infrastructure of hosting providers was compromised by Ebury. In these cases, we have seen Ebury being deployed on servers rented out by those providers, with no warning to the lessees. This resulted in cases where the Ebury actors were able to compromise thousands of servers at once,” says Léveillé. There is no geographical boundary to Ebury; there are servers compromised with Ebury in almost all countries in the world. Whenever a hosting provider was compromised, it led to a vast number of compromised servers in the same data centers.

At the same time, no verticals appear more targeted than others. Victims include universities, small and large enterprises, internet service providers, cryptocurrency traders, Tor exit nodes, shared hosting providers, and dedicated server providers, to name a few.

In late 2019, the infrastructure of a large and popular US-based domain registrar and web hosting provider was compromised. In total, approximately 2,500 physical and 60,000 virtual servers were compromised by the attackers. A very large portion, if not all, of these servers are shared between multiple users to host the websites of more than 1.5 million accounts. In another incident, a total of 70,000 servers from that hosting provider were compromised by Ebury in 2023. Kernel.org, hosting the source code of the Linux kernel, had been a victim of Ebury too.

“Ebury poses a serious threat and a challenge to the Linux security community. There is no simple fix that would make Ebury ineffective, but a handful of mitigations can be applied to minimize its spread and impact. One thing to realize is that it doesn’t only happen to organizations or individuals that care less about security. A lot of very tech-savvy individuals and large organizations are among the list of victims,” concludes Léveillé.

For more technical information and a set of tools and indicators to help system administrators determine whether their systems are compromised by Ebury, read the full white paper “Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain”. Make sure to follow ESET Research on Twitter (today known as X) for the latest news from ESET Research.

Ebury deployments per month using two different scales on the Y axis, according to the database of compromised servers maintained by the perpetrators.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Syncro Integration Announcement

We’re pleased to announce the Syncro integration with Comet is now available. This has been a popular feature request and we are pleased that partners can now monitor their backups through Syncro’s RMM platform.

Who Is Syncro?

Syncro – Helps you scale your MSP buisness with efficiency and ease.

Transform how you manage customers and your business with RMM, PSA and remote access in a single platform. The streamlined workflow allows you to focus your time and energy on what you’re an expert in – providing solutions for your clients.

How The Syncro Integration Works

With the Syncro integration, you can access RMM alerts in Syncro’s platform when a Comet backup job fails or doesn’t run. This allows you to see your alerts in one place, rather than logging into Comet, and troubleshoot before you lose any business critical data.

If you are interested in configuring this integration, you can read our guide here.

What To Expect

When a backup job fails, a new RMM alerts will be created. You can see this on the Open RMM Alerts page in Syncro. An example of how this will look is:

If the failure is due to an intermittent issue, Comet will clear the alert when the backup job succeeds again.

This means you no longer have to login to your Comet Server to check if backup jobs are running successfully or not.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×