Skip to content

Introducing the SafeDNS MacOS Agent: Stay Protected Anywhere

We’re excited to announce our latest feature, the SafeDNS Agent for MacOS. Get ready to supercharge your online security and browsing experience like never before. 

Say goodbye to worries about phishing scams, malware attacks, or ransomware nightmares. With our seamless installation process, you’ll be up and running in no time, ready to browse the web with confidence.

Take a look at this: the SafeDNS Agent not only does basic filtering stuff, but it’s packed with great security upgrades too. Think of it like your own personal bodyguard, even when you’re surfing on those dodgy Wi-Fi networks. With our user-friendly dashboard, administrators can create personalized filtering policies that can be adjusted based on the needs of different user groups within an organization. This becomes very handy when setting the various Internet usage scenarios in different departments or roles. All you have to do is install the app and customize your filtering settings from the dashboard.


Let’s break down the SafeDNS Agent’s killer features

  • Easy Installation and Setup: Setting up the SafeDNS Agent on any MacOS device is a breeze. With a simple setup process, you’ll have it installed and protecting your device in no time. The installation guide walks you through every step, ensuring that even users with minimal technical knowledge can get started quickly and effortlessly.
  • Advanced Security Features: Our agent goes beyond basic filtering. It includes advanced security features that protect against phishing, malware, and ransomware sites by analyzing website content in real-time. This extra layer of security is crucial for people who frequently connect to insecure Wi-Fi networks. Our sophisticated algorithms ensure that harmful sites are blocked before they can pose a threat, giving you peace of mind every time you go online.
  • Custom Policies: You can create custom filtering policies tailored to individual users or user groups. This is extremely useful for organizations with departments or groups that have varied internet use requirements. Plus, the intuitive dashboard means you can adjust these policies with ease to ensure that management and optimization are seamless. Whether you need strict controls for sensitive departments or more relaxed policies for creative teams, our agent adapts to your needs.
  • Insightful Reporting and Analytics: Get valuable insights into internet usage patterns and potential security threats with detailed per-device reports and analytics. This data helps you make informed decisions about your internet policies and security measures. Our analytics provide a comprehensive view of your network’s activity, highlighting areas where security can be tightened and efficiency improved.
  • Advanced Web Filtering: Thanks to our cloud-based servers, our agent offers powerful web filtering capabilities. You can block unwanted or unsafe websites based on categories or specific domains, enhancing productivity and protection against web-based threats. Our dynamic categorization system ensures that new and emerging threats are swiftly identified and neutralized.
  • AppBlocker: Our AppBlocker feature allows you to block access to all domains connected to a specific service. For example, if you block the Zoom app, access to the Zoom official website will also be blocked. More than 100 apps are under your control, all combined into 11 global groups—Cybersecurity, File Sharing, Ecosystem Applications—making control easier than ever. This granular level of control ensures that non-essential applications do not distract or pose security risks.
  • Full Query Logs: In our latest update, we now roll up minute-by-minute statistics based on these network events. What this means for you: a breakdown of user requests, domains, categories, and status in more detail, giving you a peek into activity on the internet. It’s like having a magnifying glass into your online behavior. These detailed logs provide transparency and accountability, crucial for maintaining security and compliance.


App Closure Prevention:

Our application includes a robust “App Closure Prevention” feature to ensure uninterrupted security and filtering. Even if users try to close the application window or force quit the program, the essential filtering process continues in the background. This functionality is vital for environments requiring stringent internet controls, such as schools, workplaces, and public access computers. It guarantees continuous protection and compliance with established internet policies, maintaining a safe and controlled browsing environment.

MDM Integration Made Easy:

SafeDNS Agent smoothly integrates into most Mobile Device Management (MDM) systems, making it easy to install on various devices with minimal time and effort. This capability empowers organizations to effortlessly manage and configure the app across their fleet. Control over IT administration becomes easy by centralized control of application deployment and authorization, ensuring uniform security protocols across all the devices enrolled. It is just perfect for large fleets or BYOD environments, streamlining operations and ensuring unified security standards across the organization.

The SafeDNS Agent for MacOS is your go-to solution for ensuring high levels of internet security and filtering, especially for users who frequently connect to various networks. With easy installation, advanced security features, customizable policies, and comprehensive analytics, it offers a robust defense against web-based threats. Whether you’re managing a corporate fleet, a school, or simply looking to secure your personal device, SafeDNS has got you covered. Get the SafeDNS Agent installed today and experience unmatched protection no matter where you are.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

Preview macOS Sequoia 15 with Parallels Desktop – The Ultimate Convenience for Tech Enthusiasts and Developers!

Following Apple’s WWDC ’24 conference, excitement is in the air, where the spotlight shone brightly on macOS Sequoia 15.

As tech enthusiasts and developers, we’re all eager to get our hands on the latest features and innovations. 

However, upgrading your entire Mac to the beta version might not be the most practical approach, especially when you want to stabilize your primary environment.

Thankfully, Parallels Desktop offers the most convenient way to preview macOS Sequoia 15 in a virtual machine.

You can explore the latest macOS in a safe, isolated environment without altering your primary system.

Plus, we’re thrilled to offer a free 14-day trial of Parallels Desktop, with no commitment required.

Here’s a step-by-step guide to help you get started with macOS Sequoia 15 on Parallels Desktop.

Install macOS Sequoia 15 in a Virtual Machine

Note: your Apple ID must be a member of the Apple Developer Program to proceed.

1. Download, unzip, and install the latest Xcode beta tools

– Head over to the Apple Developer Downloads page to get the latest Xcode beta tools.

2. Download the macOS 15 beta restore image

– Visit the Operating Systems Downloads page and download the macOS 15 beta restore image.

3. Create a new macOS VM in Parallels Desktop

– Open Parallels Desktop.

– Click File > New.

– Select Install Windows, Linux, or macOS from an image file, then click Continue.

– Choose the downloaded macOS 15 beta image file and click Continue.

– Set your desired name for the VM and click Create.

4. Wait for the installation to complete

– Parallels Desktop will guide you through the macOS installation process. This may take some time, so be patient as your new virtual machine is set up.

5. Complete the macOS setup

– Once the installation is complete, follow the on-screen instructions to set up a new user account in macOS Sequoia 15.

6. Install Parallels Tools

– On the menu bar, click on the virtual machine name > Install Parallels Tools.

– When the installation is complete, restart macOS 15. Parallels Tools bring clipboard synchronization and file sharing between your primary macOS and the virtual machine.

Important limitations to note

– Signing into an Apple ID in a virtual machine is not supported: you won’t be able to sign into your Apple ID within the VM.

– If you have an active VPN connection on the primary macOS, the virtual machine may lose network access. If this happens, shutdown the VM > open the VM configuration > Hardware > Network > Source: > switch to the Bridged network mode.

– Snapshots are not available yet for macOS virtual machines on Apple silicon.

Discover the latest innovations in macOS Sequoia 15

With Parallels Desktop, you can seamlessly explore macOS Sequoia 15 and stay ahead of the curve.

Our virtual machine software provides the flexibility and power you need to test new features without compromising your main operating system.

Don’t wait—download your free 14-day trial of Parallels Desktop today and dive into the future of macOS!

Happy exploring!

The Parallels Desktop Team

Try Parallels Desktop Free for 14 Days

Disclaimer: Features and steps mentioned are subject to updates and changes as software evolves. 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Parallels 
Parallels® is a global leader in cross-platform solutions, enabling businesses and individuals to access and use the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology available, whether it’s Windows, Linux, macOS, iOS, Android or the cloud.

Valuable targets attract advanced threat actors. How to defend against quiet and persistent attacks

C-level executives, diplomats, and high-ranking IT managers usually have access to sensitive information, huge amounts of data, finances, or a combination of all these things. And adversaries know it.

Anticipating all the precious data and access rights, cybercriminals and state-sponsored advanced persistent threat groups (APTs) are willing to invest a lot of time and money to orchestrate attacks that could compromise VIP devices and accounts. In this case, backdoors are particularly dangerous, because typically they have the capability to send files to the host computer, execute files and commands there, and exfiltrate (send) files and documents back to the attacker.

One of the latest examples of such an attack features several sophisticated and previously unknown backdoors called LunarWeb and LunarMail, which were recently described by ESET researchers and presented at the ESET World 2024 conference. Using advanced obfuscation techniques, they were deployed to spy on an undisclosed European ministry of foreign affairs. The attack is attributed with medium confidence to the Russia-aligned APT group Turla.

To protect against such attacks, organizations need to be proactive. This means not only training staff and deploying a reliable cybersecurity solution, but also having comprehensive cyberthreat intelligence helping them stay ahead of adversaries.  

 

 

 

 

VIPs are also threatened at home

According to a 2023 study conducted by BlackCloak and Ponemon Institute, senior-level corporate executives are increasingly being targeted by sophisticated cyberattacks. These include email compromise, ransomware, malware infection, doxing, extortion, online impersonation and even physical attacks, such as swatting.

Around 42% of surveyed organizations stated that their senior executive or an executive’s family member was attacked over the past two years. Attackers often went for sensitive company data, including financial information and intellectual property.

Cybercriminals did not hesitate to strike when their targets were the most vulnerable – at home with their loved ones. In one-third of reported cases, hackers reached executives through insecure home-office networks used during remote work.

Business email compromise (BEC) is one of the most used tactics against VIPs. It usually comprises a sophisticated scam targeting individuals performing transfers of funds and seeks to compromise legitimate business email accounts through social engineering and/or computer intrusion techniques.

According to the FBI’s Internet Crime Complaint Center (IC3) annual reports, BEC is among the costliest types of crime. In 2023, IC3 received 21,489 BEC complaints with adjusted losses of over $2.9 billion. Only investment crimes (such as pyramid schemes, real estate investment scams, or cryptocurrency investment scams) accumulated more losses than BEC in that year, with $4.7 billion reported stolen.

The Lunar toolset

ESET research on the Lunar toolset demonstrates how such carefully crafted spying can look.

The initial attack vector is not known, but recovered installation-related components and attacker activity suggest possible spearphishing with a malicious Word document and abuse of both a misconfigured network and the application monitoring software Zabbix.

Once access is gained, the backdoor installation process follows. It consists of dropping both a loader and a blob containing either LunarWeb or LunarMail, as well as setting up persistence.

From that point forward, data exfiltration can start. For example, the LunarWeb backdoor gathers data such as the OS serial name, environment variables, network adapters, a list of running processes, a list of services, or a list of installed security products, and sends them to a C&C server.

LunarWeb communicates with a C&C server using HTTP(S) underneath which is a custom binary protocol with encrypted content. ESET researchers only found LunarWeb deployed on servers, not user workstations.

LunarMail is similar, but instead of HTTP(S) it uses email messages for communication with its C&C server. This backdoor is designed to be deployed on user workstations, not servers – because it is persistent and intended to run as an Outlook add-in.

Staying under the radar

The APT group also has several tricks up its sleeve to conceal the malicious activities of deployed backdoors.  

  • The loader uses RC4, a symmetric key cipher, to decrypt path to the blob and reads encrypted payloads from it.
  • It also creates a decryption key derived from the DNS domain name, which it verifies. Using DNS domain name decryption means that the loader correctly executes only in the targeted organization, which may hinder analysis if the domain name is not known.
  • LunarWeb limits initial contact attempts with the C&C server, assessing the backdoor’s lifespan, and checking C&C server accessibility. If any of the safety conditions fail, LunarWeb self-removes, deleting its files, including the loader and the blob.
  • To hide its C&C communications, LunarWeb impersonates legitimate-looking traffic, spoofing HTTP headers with genuine domains and commonly used attributes. Notable examples of impersonation include Windows services (Teredo, Windows Update) and updates of ESET products.
  • Both LunarWeb and LunarMail can receive commands hidden in images.
  • To exfiltrate stolen data, LunarMail embeds them in a PNG image or PDF document. For PNG files, a template matching the compromised institution’s logo is used.
  • LunarMail deletes email messages used for C&C communications.
  • Both LunarWeb and LunarMail can uninstall themselves.

How to protect VIPs

Being high-priority targets, VIPs should have an adequate high-priority protection in both office and home environments.

  • Educate them and the rest of the staff – Technology alone cannot fully safeguard an organization, and the human element will always play a role. Only 9% of cybersecurity professionals participating on the Ponemon survey were highly confident that their CEO or executives would know how to protect their personal computer from viruses, and only 22% trusted them when it comes to securing personal emails.
  • Secure their remote working – Because many VIPs are targeted in their home environment, it is necessary to secure their corporate devices, personal devices used for work, and home networks. This includes a use of strong passwords or passphrases, 2FA, regular updating, patching, and backing up data.
  • Adopt a zero-trust approach – Take measures to efficiently screen every single point of access, both employee and device – internal and external. Naturally, CEOs and high-ranking managers need a lot of access to perform their duties, but it does not have to be unlimited. Evaluate how much privilege they really need to protect your institution’s data in cases when VIPs’ accounts are compromised.
  • Deploy reliable cybersecurity – As the Lunar toolset shows, current cyberthreats operate above the security threshold of traditional firewalls, and more sophisticated security measures need to be adopted. Protection of C-level officials should include multilayered security and proactive defense benefiting from cyber threat intelligence.

ESET Threat intelligence monitors APT groups such as Turla, observing their tactics, techniques, and procedures (TTPs) in order to help organizations prepare for APTs’ new tricks and to also understand their motives. Thanks to comprehensive ESET reports and curated feeds, organizations can anticipate threats and make faster, better decisions.

Facing the big guns

VIPs are prized trophies for cybercriminals and APTs, be they for financial gain or political reasons. Therefore, they often bring their biggest guns to compromise targets’ accounts and devices.

This means that organizations need to build an awareness culture among their employees and protect their devices with the latest technology. ESET solutions and services can help with that.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Debunking The Top 10 Discrete Manufacturing OT Cybersecurity Myths

When you think of cybersecurity, what comes to mind?

Continue reading

What’s keeping CISOs up at night?

Introduction 

Cybersecurity is no longer a siloed concern relegated to IT departments; it’s a fundamental component of business strategy. Chief information security officers (CISOs) face mounting pressures to not only protect their organizations but also to integrate cybersecurity into the broader business framework.

This is the focus of our recent webinar, “The CISO balancing act: How to tackle rising cybersecurity pressures in 2024,” where industry experts share insights and strategies. Read further for a summary highlighting the key takeaways.

Watch the on-demand webinar

Strategies for CISOs navigating cybersecurity challenges

As the digital landscape expands, so do the complexities of managing cybersecurity. We’re seeing a mix of longstanding challenges and new, emerging threats that are putting unprecedented pressure on security professionals worldwide.

Our on-demand webinar provides strategic and operational insights based on extensive research and interviews with over 30 top security professionals from organizations around the globe. Whether you’re a CISO, a security analyst, or a business leader, these compiled insights will help you navigate the obstacles ahead.

Join Mark Renouf, former BBC journalist and contributor, as he engages with industry experts Tim Rhodes, managing director at Apprize360, and Kim Larsen, CISO at Keepit, to discuss key takeaways from the study, such as:

  • Decisions to consider as you prepare for both known and unknown threats. 
  • Key components of a resilient security framework that adapts to both current needs and future technologies. 
  • How to identify solid best practices to embrace. 

 

 

The importance of a data governance framework

One of the most pressing challenges identified in the webinar is the need for a robust data governance framework. This is highlighted as a top priority by nearly all the CISOs and IT leaders interviewed.

Key points:

  • Customization and scalability: Organizations need data governance frameworks tailored to their specific needs, which can grow and evolve with them.
  • Deployment challenges: Many leaders struggle with effectively deploying and maintaining these frameworks. 
  • Foundational role: Data governance is foundational to overall cybersecurity strategy, impacting compliance, risk management, and operational efficiency. 

 

Data classification: The bedrock of data governance

Hand in hand with data governance is the need for an effective data classification strategy. This is emphasized as a critical step before any governance framework can be successfully implemented.

Key points:

  • Foundation first: Proper data classification is seen as the cornerstone of an effective data governance framework. 
  • AI and automation: While AI and machine learning hold promise for automated data classification, there’s caution about relying too heavily on these technologies without thorough vetting. 
  • Simplification: Effective data classification frameworks should avoid complexity, making them easy to understand and use across the organization. 

 

Board involvement in cybersecurity

Another major theme is the crucial role of board involvement in cybersecurity strategy. Despite its importance, many organizations still lack adequate board engagement in this area.

Key points:

  • Risk integration: Boards need to integrate cybersecurity risks into their overall risk management strategies. 
  • Education and engagement: CISOs often need to educate board members about cybersecurity threats and the importance of proactive strategies. 
  • Strategic role: Cybersecurity should be a regular item on board agendas, influencing broader business decisions. 

 

Defensible security strategies

CISOs are increasingly focusing on creating defensible security strategies rooted in zero trust principles. This involves continuous threat modeling and analysis, ensuring that security measures can withstand scrutiny and adapt to evolving threats.

Key points:

  • Lifecycle approach: Viewing cybersecurity through a lifecycle lens rather than isolated solutions. 
  • Zero trust: Implementing zero trust principles to create a more resilient security posture. 
  • Continuous improvement: Regularly updating and refining security strategies to address new threats. 

 

Vendor partnerships: beyond products to solutions

Effective cybersecurity often depends on strong vendor partnerships. CISOs are looking for vendors who can provide not just products but comprehensive solutions and strategic advice.

Key points:

  • Consultative partnerships: CISOs value vendors who act as partners, offering strategic guidance and support. 
  • Integration and collaboration: Vendors should work seamlessly with internal teams and other third-party solutions to provide cohesive security coverage. 
  • Service and support: High levels of service and support from vendors are crucial for maintaining effective security postures. 

 

Addressing CISO experience and maturity 

The webinar highlights the varying levels of experience and maturity among CISOs, which can significantly impact an organization’s cybersecurity effectiveness.

Key points:

  • Diverse backgrounds: CISOs come from various professional backgrounds, affecting their approach to cybersecurity. 
  • Rapid impact: With an average tenure of 24-36 months, especially in the U.S., CISOs need to make quick, impactful changes. 
  • Training and development: Continuous education and professional development are essential for CISOs to stay ahead of emerging threats. 

 

Conclusion 

As we navigate the complexities of cybersecurity in 2024, the role of the CISO is more critical than ever. Effective data governance, board involvement, strategic vendor partnerships, and continuous improvement in security strategies are vital. Organizations that prioritize these areas will be better equipped to handle the rising pressures and evolving threats in the cybersecurity landscape.

By integrating these insights into their operations, businesses can enhance their cybersecurity posture, ensuring not only protection but also resilience and strategic advantage in the digital age. 

Watch the on-demand webinar

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×