A year of helping companies move away from organizational chaos

And just like that, we’ve turned one!

“Things should be made as simple as possible, but not any simpler,” goes a quote attributed to Einstein. In the same vein, we could say, “people should be involved in work as much as necessary, but not any more.” It was with this belief that we built Orchestly and announced it to the world, on this day in 2019.

One year has passed now, and the world has already changed in drastic and unforeseen ways. These changes, though, have strengthened our resolve to keep improving Orchestly to better meet our stated goals. The need for streamlining and simplifying the work we do is now not just a business advantage, it’s a necessity.

This new way of managing work is what Orchestly set out to help businesses achieve. As a result, we’ve made it a lot easier to automate out the mundane side of work, while leaving humans with the parts where intuition, judgement, and taste are needed.

Here’s a quick recap of what’s happened over the past year, on both our customers’ end and our own.

What our customers have done

Here are some of the ways Orchestly customers have used the platform that we thought you could take inspiration from:

  • A global healthcare provider has fixed the problems in their IT processes by automating their workflows through Orchestly.

  • A multinational conglomerate has implemented their change management process and several marketing activities with no dents to their process structure.

  • A leader in quality control, who performs testing and certification for many industries, uses Orchestly to streamline their work.

  • A cyber security and crimes investigation firm uses Orchestly for their business processes.

  • A leading online education platform uses Orchestly to keep track of their sales processes.

The biggest takeaway for us has been Orchestly’s versatility in helping streamline business processes of any nature. Some of our customers have truly wowed us with the kinds of problems they’ve solved using Orchestly.

We’re constantly evolving

While our customers have made the most of Orchestly’s potential, we, on the other hand, have worked on pushing it even further.

Orchestly is simple enough that companies can get hundred-step processes implemented all by themselves—but powerful enough to meet the enterprise segment’s complex needs. We’re constantly working on making Orchestly a holistic tool to automate every kind of business process. 

Here are some of the many additions made to Orchestly over the last year:

Our first year in the arena has inspired us and shown the way forward for the platform. We hope Orchestly helps you find the way forward for your business processes, too.We created Orchestly to help businesses eliminate chaos and drudgery from their processes, and that’s not going to change.

Always happy to help,

Team Orchestly

 

Net Universe offers all Zoho subscritpions and consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/zoho.

an attacker’s waves of information-stealing malware – Sophos News

In a series of malspam campaigns dating back to November of 2019, an unidentified group sent out waves of installers that drop remote administration tool (RAT) and information stealing malware on victims’ computers.

We’ve identified five separate campaigns between November, 2019 and January, 2020 in which the payloads used similar packing code and pointed to the same command and control (C&C) infrastructure. The campaigns targeted industrial companies in Europe, the Middle East, and the Republic of Korea. This leads us to believe that they are all the work of the same actors—a group we’ve dubbed RATicate.

A new campaign we believe connected to the same actors leverages concern about the global COVID-19 pandemic to convince victims to open the payloads. This is a shift in tactics, but we suspect that this group constantly changes the way they deploy malware—and that the group has conducted campaigns prior to this past November.

In this post, we’ll focus on the initial wave of campaigns, which all used Nullsoft Scriptable Install System (NSIS) installers. NSIS is an open source tool for creating Windows installers, designed for Internet-based software distribution. But it has also been abused for a long time to disguise and deploy malware. (We’ll discuss newer campaigns using other installers, and the group’s shift in phishing tactics, in an upcoming follow-up report.)

Plugged in for malware

One of the interesting features of NSIS installers is their plug-in architecture, which allow installers to communicate with other software components—including components of the Windows operating system. (A list of available plug-ins can be found here.) These plug-ins are deployed as Windows DLL files. If selected during the installer build, they will be automatically added to the final compiled NSIS installer’s packaged files inside the “$PLUGINS” folder.

Some of the capabilities these plugins can provide include:

The installers we looked at caught our attention because they all drop the same set of “junk files” (files that are never used by the installed malware) across the initial sample set. We’ve seen the tactic of packing NSIS installers with garbage files to conceal malware in the past; the junk files are intended to confuse analysts and create “noise” during sandbox analysis. So this behavior caught our attention, and we started to analyze it in more detail.

We found that all the samples use the System.dll plugin, which allows you to load a DLL and call its exported functions. The DLL called by these malicious installers injects a payload into memory (in most cases by using cmd.exe).

For purposes of illustration, this report focuses primarily on the analysis of one sample NSIS installer from the first group we discovered:

The output of the Exeinfo PE tool identifies the sample as an NSIS installer

NSIS installers contain compressed components, including executable code, which can be loaded into memory by the installers. These components can be extracted using file decompression tools, such as 7zip.

Output of 7zip after list the files contained on the analyzed sample

The files dropped by this sample included the following types:

    • ASCII text
    • C source files, in ASCII text
    • data
    • Executable and Linkable Format (ELF) 64-bit
    • GIF image data
    • JPEG image data
    • PC bitmap, Windows 3.x format, 164 x 314 x 4
    • PE32 executable (DLL)
    • PE32 executable (GUI)
    • POSIX shell script, ASCII text executable
    • Python 3.6 byte-compiled
    • XML 1.0 document

The installer drops the junk files into the %TEMP%/careers/katalog/_mem_bin/page1/W3SVC2 folder.

Junk files created by analyzed sample.

There are only two components dropped by the installer that are important to the malware installation, which are dropped into the $TEMP folder. In the case of the NSIS installer we analyzed for this report, these two components are:

  • aventailes.dll (the Initial Loader)
  • Cluck (Encrypted data)

The payloads of the installers we examined vary. During analysis of the samples we collected—conducted both manually and with the aid of sandboxing tools—we found several different families of RATs and infostealers. These included Lokibot, Betabot, Formbook, and AgentTesla. But all of them followed the same multi-stage unpacking process when executed.

First stage: initial loader and shellcode

In the first stage, the installer deploys the initial loader, a malicious DLL. The DLL is then used to begin decryption of the malicious payload, and then finally to inject malicious payload into memory while the NSIS layer drops the junk files. The following images show how the analyzed sample creates a cmd.exe process, which is used to inject the Final Payload.

Output of Procmon which shows how the analyzed sample creates a child process
The memory of created child process by the analyzed sample. The final payload is loaded at the address 0x400000.

The malicious DLL deployed with the RATicate installers (in this case, aventailes.dll) is a custom loader, likely developed by the threat actor, stored in the $TEMP folder of the file package. All of the analyzed initial loaders are DLL files with only one export, though the name of the loader and the export function vary across the samples. In this case, the export was named Inquilinity.

Export of Initial Loader

This export is called using the NSIS System plugin as explained previously. The export loads and executes a shellcode, located in the initial loader’s .rdata section. The shellcode is initially encrypted using a basic arithmetic operation. This operation varies across the initial loaders we analyzed.

The shellcode dropped by the initial loader then reads the Encrypted data (Cluck file) where other loaders and payloads are stored. These PE files and shellcodes are decrypted on demand during the next two stages of malware deployment. In the first stage of the decryption, done by the shellcode called by initial loader, contains an xor key, a second shellcode (shellcode 2), and a PE file (Loader 2).

The xor key is used to decrypt shellcode2 and Loader 2.

Here’s how the workflow of Stage 1 breaks down in depth:

Stage 1 workflow:

  1. NSIS exe file is executed.
  2. System.dll plugin loads and calls to Initial Loader (aventailes.dll)
  3. The export of Initial Loader decrypts shellcode1 and jumps to it.
  4. shellcode1 reads Cluck file which is loaded in a memory buffer.
  5. shellcode1 decrypts both shellcode2 and Loader2 and maps shellcode2 then jumps to it.
  6. shellcode2 maps Loader2 into memory (Reflective loading).

Second stage: second shellcode and loader DLL

The second stage of decryption begins when Loader 2 is loaded in memory by shellcode2. Loader 2 reads the Cluck file in order to decrypt more artifacts. The data for this stage is decrypted with a dynamically generated xor key based on the name of the file which contains the encrypted data (which in this case is Cluck). As shown below, after this xor is applied, there is another xor key (xor_key2) stored in the second part of the file, which is used to decrypt different artifacts like strings, shellcodes, and PE files.

Stage 2 workflow

  1. Loader2 starts executing its DllEntryPoint.
  2. Loader2 reads again Cluck file.
  3. Loader2 decrypts from Cluck some shellcodes which are never used.
  4. Loader2 decrypts shellcode3 from read data from Cluck.
  5. Loader2 executes shellcode3, which decrypts the Final Payload (a PE file).

Third stage: injection

After the decryption, shellcode3 injects the final payload in a child process. It accomplishes this using cmd.exe with the NtCreateSection + NtMapViewOfSection code injection technique.

These are the extracted artifacts during the analysis.

ARTIFACT HASH
Loader 2 c2cdb371d3394ff71918ac2422a84408644fa603f1b45e3fb1a438dbce9dcad0
Final Payload 46c6fa90acdf651e99620c257ae4e9ed9d1cfcb31fd676dc9b570bb3f9720ac8

Hints of a single actor

We found 38 NSIS installer samples in total that shared very similar characteristics:

Identical junk files. Not only their name, but also their content. When generating the installer from NSIS Script, the actor who is packing the payload would have to have all these random files in their possession on their hard drive.

The loader is the same: All the loaders across analyzed NSIS installers are the same, not in terms of their hash value but in terms of their functionality.

  •  All initial loaders have just one export, which is called by the NSIS installer
  •  The Initial Loader reads from Encrypted Data in order to decrypt a shellcode which loads the Loader 2.
  •  Loader 2 across all samples extracts and decrypts shellcode 3 from Encrypted Data.
  • Shellcode 3, responsible for decrypting the final payload and injecting it into a remote process, is binary-equal between all analyzed samples.

However, each NSIS installer we looked at dropped different malware payloads. We considered two possible scenarios: either the malicious NSIS package is a generic packer sold on dark forums; or, the same threat actor is using a custom loader to deploy different payloads in a variety of their attacks.

While there are many packers sold in dark forums, we found this scenario unlikely, as one should expect the junk files to change along with the payloads, if different actors were using the same generic packer. So, we continued our investigation with the hypothesis the attacks come from the same actor.

Given the evidence we have in hand, we can’t prove that a single actor was responsible for all of them, but we at least knew from the identical packing strategy and artifacts that we could find a way to connect all of them. We performed further analysis in search of a definitive link, turning to the infection chain that delivered them.

Based on Sophos telemetry, we found a set of NSIS installers dropping these same junk files as part of an email campaign seen between December 8 and December 13, 2019. (We later designated this wave Campaign 3, after discovering other sets of NSIS installers, discussed later.) In the email attacks we observed, the targets appeared to all be critical infrastructure providers (or businesses related to critical infrastructure). We analyzed the observed attacks using VirusTotal’s graphing feature, gathering open-source information about other victims.

The graph above shows the infection chain for some of the analyzed NSIS installers. It reveals two common patterns used to infect a victim:

Superimposing the distinct infection chains over the graph shows that both chains were used for the same target company revealed by VT data. It is likely the same approach is taken for any targeted company.

We were able to retrieve some of the emails associated with this campaign from VT. With these emails, we were able to identify some of the installers’ targets.

 

EMAIL_2.png
One of the Campaign 3 emails, presenting the installer as a “banking confirmation.”

Many of the the emails we found in VirusTotal data did not show recipients’ addresses, or the “To” address was filled with the same email address that appeared in the “From” field. In these cases, we analyzed the email headers—since the headers hold more information related to the email, like the original recipients.

During the analysis of the NSIS installers we found with identical junk files to our initial sample, we identified at least 5 different malware families used as final payload—all of them InfoStealer or RAT malware:

  • ForeIT/Lokibot
  • BetaBot
  • Formbook
  • AgentTesla
  • Netwire

We then looked at the Command and Control (C&C) infrastructure used for these payloads, to check for any relationship between them and to see if the C&Cs were used to send the stolen data points to same or similar servers.

These are some of the families identified in this campaign and their C&Cs:

TYPE OBSERVED PAYLOADS OBSERVED PAYLOAD C&C DOMAINS
Info Stealer Betabot stngpetty.ga
allenservice.ga
gelcursot.top
Info Stealer Formbook ef-oh.com/c208
odoyo.net/c208
hearee.com/c208
binzom.com/c208
pizzans.com/c208
phochain.com/sa
rdrfi.com/sa/
skylod.com/sa
hsctsu.com/sa
Info Stealer Lokibot gelcursot.top
RAT Netwire 79.134.225.97:2556
RAT AgentTesla mail.newmedicacare.com
mail.jrdigitalstore.com
mail.koyo.com.my
mail.qoa.com.my
mail.sedirectory.com.my

Almost all of the malware samples of each type connected to the campaign share the same C&C. And in some cases, even different families—such as Lokibot and Betabot—share same domain for their C&C.

Identifying more campaigns

Following this pattern—looking for other groups of NSIS installers which drop identical junk files during the same range of dates—we were able to identify 5 distinct NSIS campaigns that took place between November 16, 2019 and January 8, 2020. While the junk files for each of these campaigns were different from our first samples, their behavior was identical (or at least similar) to those observed in Campaign 3.

NAME DATES
Campaign 1 2019-11-16/2019-11-20
Campaign 2 2019-11-25/2019-11-26
Campaign 3 2019-12-08/2019-12-13
Campaign 4 2019-12-20/2019-12-31
Campaign 5 2020-01-03/2020-01-08

 

Campaign 1 (November 16-20, 2019)

These are the dropped junk files for all NSIS installers that belong to Campaign 1:

image2020-3-27_14-56-52.png
Output of 7z after list the files contained on a sample that belongs to campaign 1

These are some of the payloads identified for Campaign 1 on a first triage of the installers.

TYPE OBSERVED PAYLOADS OBSERVED PAYLOAD C&C DOMAINS
Info Stealer Betabot negrodesigns.ga
gelcursot.top
webxpo.ga
Info Stealer Lokibot gelcursot.top
Info Stealer Formbook cbespania.info/c206
conrak.net/c206
coxemen.com/c206
dachfix.com/c206
hypnose-beziers.com/c206
jevmod.com/c206
lighthouse-campus24.com/c206
oleum.gmbh/c206
pupilfy.com/c206
tellpizzqhut.com/c206
terenium.com/c206
vibe.restaurant/c206
yamatobb.com/c206
yncits89.com/p0x
ratokasutka.com/p0x
miscov.com/p0x
RAT Netwire 79.134.225.11:1199

Here is a sample of the emails we collected from VirusTotal connected to Campaign 1:

Used emails on Campaign 1

The following graph shows the relation and infection chain for campaign 1 (based on available data on VT)

 

Campaign 2 (November 25, 2019 to November 26, 2019)

These are the dropped junk files for all NSIS installers that belong to campaign 2:

image2020-3-27_15-8-52.png
Output of 7z after list the files contained on a sample that belongs to campaign 2

Some of the payloads identified for campaign 2 on a first triage included the following:

TYPE OBSERVED PAYLOADS OBSERVED PAYLOADS C&C DOMAINS
Info Stealer Betabot negrodesigns.ga
Info Stealer Formbook czxpkj.com/c206
pupilfy.com
cbespania.info/c206
jevmod.com/c206
RAT Bladabindi tucson1989.duckdns.org
pedrobedoya201904.duckdns.org
RAT Blackrat 79.134.225.97:1982
RAT Remcos cashout2018.ddns.de

We found no emails for this campaign, so we were unable to map its intended targets. The graph below shows the relationship between the similar payloads.

Data from VirusTotal

Campaign 4 (December 20, 2019 to December 31, 2019)

These are the dropped junk files for all NSIS installers that belong to campaign 4:

image2020-3-26_20-58-10.png

Some of the payloads observed associated with campaign 4 included:

TYPE OBSERVED PAYLOADS OBSERVED PAYLOADS C&C DOMAINS
Info Stealer Betabot pitchstak.ga
Info Stealer Lokibot pitchstak.ga
Info Stealer Formbook slashoff.com/c208
sofisleep.com/c208
jinshasoft.com/c208
binzom.com/c208
RAT Netwire 79.134.225.97:2556
RAT AgentTesla mail.newmedicacare.com

 

EMAIL_CAMPAIGN_4.png
Emails collected from VirusTotal tied to campaign 4.

 

Campaign 5 (January 3, 2020 to January 8, 2020)

These are the dropped junk files for all NSIS installers that belong to campaign 5:

image2020-3-27_14-42-39.png
Output of 7z after list the files contained on a sample that belongs to campaign 5

Some of the payloads of campaign 5:

TYPE OBSERVED PAYLOADS OBSERVED PAYLOADS C&C DOMAINS
Info Stealer Betabot pitchstak.ga
Info Stealer Lokibot pitchstak.ga
Info Stealer Formbook binzom.com/c208
bywebhost.com/c208
jinshasoft.com/c208
RAT Netwire 79.134.225.97:2556
RAT AgentTesla mail.arkazo.com
mail.alhilaly-group.com

Sample emails we collected tied to campaign 5:

The following graph shows the relation and infection chain for campaign 5 (based on available data on VT)

Profiling the threat actor

Looking across all the campaigns we discovered during this analysis, we saw frequent duplications in C&C infrastructure, as shown in the table summarizing the campaigns below:

CAMPAIGN DATES TYPE OBSERVED PAYLOADS OBSERVED PAYLOADS C&C DOMAINS
1 2019-11-16/2019-11-20 Info Stealer Betabot negrodesigns.ga
gelcursot.top
webxpo.ga
Info Stealer Lokibot gelcursot.top
Info Stealer Formbook cbespania.info/c206
conrak.net/c206
coxemen.com/c206
dachfix.com/c206
hypnose-beziers.com/c206
jevmod.com/c206
lighthouse-campus24.com/c206
oleum.gmbh/c206
pupilfy.com/c206
tellpizzqhut.com/c206
terenium.com/c206
vibe.restaurant/c206
yamatobb.com/c206
yncits89.com/p0x
ratokasutka.com/p0x
miscov.com/p0x
RAT Netwire 79.134.225.11:1199
2 2019-11-25/2019-11-26 Info Stealer Betabot negrodesigns.ga
Info Stealer Formbook czxpkj.com/c206
pupilfy.com
cbespania.info/c206
jevmod.com/c206
RAT Bladabindi tucson1989.duckdns.org
pedrobedoya201904.duckdns.org
RAT Blackrat 79.134.225.97:1982
RAT Remcos cashout2018.ddns.de
3 2019-12-08/2019-12-13 Info Stealer Betabot stngpetty.ga
allenservice.ga
gelcursot.top
Info Stealer Formbook ef-oh.com/c208
odoyo.net/c208
hearee.com/c208
binzom.com/c208
pizzans.com/c208
phochain.com/sa
rdrfi.com/sa/
skylod.com/sa
hsctsu.com/sa
Info Stealer Lokibot gelcursot.top
RAT Netwire 79.134.225.97:2556
RAT AgentTesla mail.newmedicacare.com
mail.jrdigitalstore.com
mail.koyo.com.my
mail.qoa.com.my
mail.sedirectory.com.my
4 2019-12-20/2019-12-31 Info Stealer Betabot pitchstak.ga
Info Stealer Lokibot pitchstak.ga
Info Stealer Formbook slashoff.com/c208
sofisleep.com/c208
jinshasoft.com/c208
binzom.com/c208
RAT Netwire 79.134.225.97:2556
RAT AgentTesla
5 2020-01-03/2020-01-08 Info Stealer Betabot pitchstak.ga
Info Stealer Lokibot pitchstak.ga
Info Stealer Formbook binzom.com/c208
bywebhost.com/c208
jinshasoft.com/c208
RAT Netwire 79.134.225.97:2556
RAT AgentTesla mail.arkazo.com
mail.alhilaly-group.com

We also found that some of the different payloads from each campaign (mostly Betabot, Lokibot, AgentTesla and Formbook) shared the same C&C. This suggests that the same actor/group was managing the web panels behind these malware campaigns.

There was also a distinct clustering of the campaign timelines—there was never any overlap between them, suggesting that they were operated serially by the same threat actors (including a sixth campaign we observed, to be covered in our next report):

These campaigns didn’t just share command and control infrastructure across different payloads within the same campaign. Some of the infrastructure was also shared across multiple campaigns, which also suggests the same actor was involved across all of them.

The following tables show some interesting relations between campaigns.

Targeting and motivation

Based on the payloads used by RATicate, it’s clear that the campaigns run by the group are intended to gain access to and control of computers on the targeted companies’ networks. The targets identified from the collected emails sent by these campaigns include:

  • An electrical equipment manufacturer in Romania;
  • A Kuwaiti construction services and engineering company;
  • A Korean internet company;
  • A Korean investment firm;
  • A British building supply manufacturer;
  • A Korean medical news publication;
  • A Korean telecommunications and electrical cable manufacturer;
  • A Swiss publishing equipment manufacturer;
  • A Japanese courier and transportation company.

We know that the targets overlapped on at least two campaigns: Campaign 1 and 2 both targeted the electrical equipment manufacturer. There are likely more targets that were common across multiple campaigns (we looked only at publicly-available data from VirusTotal, and have not explored non-public databases). And many (but not all) of the companies that have been targeted-up are related to critical infrastructure.

We’ve detected one more recent campaign using these NSIS installers (from January 13-16). However, as we’ve continued to research this actor group, we’ve been studying other campaigns that we believe are being run by the the same actor—and we believe that since January, the actor has moved to using other loaders and packers.

One of those campaigns is an email campaign we detected in March that uses the COVID-19 global pandemic as a lure to get victims to open the payload. The most recent detected samples are delivered with a variety of Visual Basic loaders —including the Guloader malware dropper discovered by Proofpoint on December 2019. 

We believe these campaigns are run by the same actor fro a number of reasons:

  •  The email targets the same companies seen in previous campaigns.
  • Some of the detected payloads are Betabot and Lokibot, families observed in previous campaigns.
  • This Betabot’s C&C are similar to observed in these previous campaigns—it uses same domain as Campaign 3 for Betabot (stngpetty[.]ga) and uses a similar path (/~zadmin/{NAME1}/{NAME2}/logout.php).

Based on their behavior, we’re unsure of whether the RATicate group is focused on corporate espionage or is simply acting as a malware-as-a-service provider to other actors. It could simply be that they are dropping malware on targeted companies in order to provide paid access to others, or are using InfoStealer and RAT malware as part of a larger malware distribution effort. We continue to analyze the new attacks and hope to get deeper insight into their motivations.

Anti-sandboxing by dumb luck

During our analysis of the first RATicate sample, we discovered that the Shellcode3 dropped by the installer uses a number of interesting techniques to make it difficult to analyze API calls, as well as a number of anti-debugging tricks to further hinder analysis. But we also found a strange behavior in these samples: if the sample is executed with its SHA256 hash as its filename, the program will crash.

Analyzed sample crashing when the file name size is its SHA256 hash.

This sort of behavior might be seen as an anti-analysis trick. Since sandboxes usually run the samples with their hash as a filename, this technique could avoid the execution of the payload in sandbox environments. But in this case, the behavior is actually because of a bug in the code.

The error occurs during the execution of shellcode 3.

A snippet of shellcode 3’s code as viewed in IDA Pro.

Shellcode3 uses a known technique to get the address of loaded modules (such as libraries and the executable’s image itself) by searching against the LDR_DATA_TABLE_ENTRY data structure within the Windows operating system’s Process Environment Block (PEB). The LDR structure contains information that includes the names and addresses of loaded modules. The shell code checks this structure against hashes of the desired function names, providing a silent way to dynamically resolve the memory address of a function to be called.

Shellcode 3 function to get module base addresses based on LDR_DATA_TABLE, which contains a bug that causes the sample to crash.

This feature is implemented in the code’s get_dll_base_addres_from_ldr_by_hash(dll_hash) function, which is where the crash happens. The function walks through the LDR data structure, hashing the names of loaded modules in order to try to match the hash passed as argument.

The function puts the contents of ldr_data_table->BaseDllName.Buffer into vulnerable_buffer in order to convert the ANSI string to a UNICODE string.

But since the size of the vulnerable_buffer string is 104 and it’s storing a Unicode string, which means its size limit is really just 52 ANSI characters. The consequences of that are if the filename has a length of 53 or more characters, a buffer overflow will occur. To make the program crash, you simply need to give the sample a 57-character-long filename (such as “this_is_57_length_filename_in_order_to_do_a_crash_PoC.exe”).

Once analyzed, we determined this was a programming error, rather than an anti-sandbox technique.

Indicators of Compromise (IOCs)

Hashes for the files associated with the RATicate campaigns can be found on SophosLabs’ GitHub here.

 

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Fortinet Continues to Redefine Security

The entire world has been undergoing one of the most massive network reconfigurations in the history of computing. Networks have been literally turned inside out as millions of internal users, almost overnight, became part of the new network edge. One outcome of this sudden stress test of our BCDR (business continuity and disaster recovery plans) is that that too many organizations suddenly learned that their traditional firewalls could not scale to support this explosion of edges. This has forced many organizations to upgrade devices or even install completely separate appliances to meet the demands of a new remote workforce.

Solving the Wrong Problem

The problem is that most security vendors have failed to fund the innovation necessary to meet the high performance and high scalability requirements of today’s networks – which means that (for years) they have been unable to deliver the solutions their customers need at a price point they can afford. As a result, organizations have been forced to buy “good enough” solutions that struggled to support standard digital innovation. And unfortunately, those ‘good enough’ security solutions were suddenly not good enough as organizations scrambled to rapidly scale remote workers and inspect encrypted traffic.

This should not have been a surprise, as we have been headed toward this situation for a while. Digital innovation puts increasing pressure on the security infrastructure, and security manufacturers keep putting off addressing the problem. It’s as if those vendors have been driving down a completely different road from the one that their customers are traveling. Security innovation needs to solve the big problem everyone is facing – the need to protect today’s expansive, dynamic, and high-performance networks. 

Today’s companies use complex, hybrid networks, and multi-cloud environments to process unprecedented volumes of data. They need security tools capable of enabling hyperscalability and hyperconnectivity and delivering an optimal user experience to their workers and customers. But most legacy security has failed to keep up. So to meet new business demands – where the bar is continuously being raised in terms of performance, scalability, and time to market – more and more of these organizations have had to turn off or dial down their corporate security.

Innovation is Essential for Customers and Partners

In stark contrast, Fortinet’s commitment to innovation – with more security patents than our next several competitors combined – has enabled us to continue delivering a level of security performance, functionality, and interoperability unmatched in the industry – even as the current situation has completely transformed most networks and users. 

It starts with the Fortinet Security Fabric platform, designed to deliver the following critical security differentiators in a single, integrated package.

Security-Driven Networking (SDN)

The core idea behind Security-Driven Networking is that security and networking must be two sides of the same coin. That way, whenever the networking infrastructure evolves or expands, security not only automatically adapts as an integrated part of that environment, but can also leverage Fortinet’s SPUs to ensure accelerated performance across all network edges. 

Internal segmentation is a perfect example of the necessity for Security-Driven Networking. It combines internal network infrastructures with the Security Fabric platform to dynamically protect networks inside the perimeter from active threats through dynamic and intelligent segmentation. This not only enables organizations to see and separate all of the devices on their network but also dynamically create horizontal segmentation to support and secure applications and automated workflows that need to travel across the extended network.

Fortinet pioneered Secure SD-WAN, which is an excellent example of Security-Driven Networking. In SD-WAN environments, security is woven together with connectivity functions such as application steering, bandwidth management, and dynamic failover to ensure that when connections adjust to maintain quality of experience, security is an integrated part of that process. This integrated approach can then be extended to the SD-Branch by securing access points, switches, and even 5G connectivity.

The Performance Advantage of Fortinet’s Security Processing Unit (SPU) Innovation

Advanced security designed to protect the internal network, as well as the perimeter, requires a level of performance that other security vendors can’t provide. The truth is, software-based security offerings running on off-the-shelf CPUs will never be able to meet today’s advanced network performance requirements. It would be like trying to run a processor-intensive video game on a system without a GPU. Even a gaming system built using the fastest CPUs won’t be able to keep up.

We have spent years developing custom Security Processing Units (SPUs), such as our latest NP7 Network Processor, to enable organizations to deploy true, enterprise-class security in even their most demanding environments. The NP7 can inspect encrypted traffic about twenty times faster than devices that rely on off-the-shelf CPUs – and it delivers comparable performance acceleration across all critical security functions, including firewall, threat protection, connections per second, concurrent connections, and IPSec VPN. And our advanced Content Processors are designed to support the processor-intensive convergence of security and networking required by Security-Driven Networking – which is fundamental to protecting the next generation of highly dynamic networks. 

These SPUs not only provide customers with the fastest security and SD-WAN platforms in the industry and enable unprecedented levels of integration between security and networking environments, but they also lay the foundation for the successful securing of the next generation of advanced networks. This includes collaborative smart environments and ultra-fast, hyperconnected edge networks powered by 5G and beyond.

Zero-Trust Network Access

Rather than operating an open network where data access is driven by inherent trust, organizations need to start with the assumption that any device can, and may already have been compromised. As a result, every device and user that connects to the network, whether through edge access points or physical connections to the internal network, needs to be authenticated, inventoried, assessed, and then allocated the minimum amount of access privilege possible to still do its job. And more, security needs to be in place inside the network to monitor and enforce those policies by responding to policy violations and abnormal behavior at internal network speeds.

In today’s hyper-mobile world, users can work and connect from anywhere and anytime. Equally important, then, is deep visibility of users and devices, both on- and off-network. And to then leverage that visibility to make informed policy-driven decisions to minimize risks to the organization such as limiting access based on posture, or placing certain devices in a specific (VLAN) segment of the network.

Dynamic Cloud Security:

As organizations leverage multiple cloud environments, such as private cloud, public cloud, and SaaS, to build and deploy business applications, the importance of consistently securing this heterogeneous environment increases. Furthermore, by leveraging public IaaS and SaaS infrastructures, the attack surface has increased beyond the usual network and application attacks to other types of malicious behavior targeting the misuse and misconfiguration of the cloud infrastructure. 

Compounding the challenges associated with the use of a heterogeneous technology stack, and the complexity of implementing best-practice security across the network, applications, and cloud platform vectors, organizations are also challenged by the lack of skilled professionals.

Fortinet’s dynamic cloud security addresses the intersection of these challenges by enabling organizations to confidently deploy any application on any cloud while implementing the same security tools in every cloud environment for consistent policy enforcement and unified threat response. With the broadest set of security solutions natively integrated into the most cloud environments, with all offering streamlined management and automation capabilities across these environments, organizations can unleash digital innovation initiatives for each cloud, or across multiple clouds, without compromising security.

AI-driven Security Operations:

Even as the network paradigm has undergone a metamorphosis, the threat landscape has continued to accelerate – quickly taking advantage of an exponentially expanded (and in many cases, hastily implemented) digital attack surface. Most security vendors are just as far behind on platform integration – let alone developing and integrating AI technologies across that platform – as they are with the development of accelerated and hyperscale security. Coupled with the chronic shortfall of cybersecurity professionals, this lack of innovation can be devastating. 

Fortinet’s advances in AI-powered security – for advanced threat prevention, detection, and response – are ideally suited to meet the challenges of today’s security operations, whether deployed in our cutting-edge threat research labs or throughout our customers’ security operations. It underpins our ability to automatically analyze more than 100 billion security events from all around the world every day, which is then used to quickly generate global threat intelligence pushed out across our threat prevention portfolio. At the same time, it is also now being built directly into the solutions deployed by our customers to prevent and detect attacks specific to their organizations. And it is even utilized in many of our SOC platforms that automatically enrich, alert, and orchestrate a coordinated response across incidents anywhere across the digital attack surface.

Open Fabric Ecosystem:

None of this can happen in isolation, which is another of the dangerous gaps created by today’s security vendors. All of Fortinet’s security solutions – and we have the broadest portfolio of solutions in the industry – have been engineered to work together as a single, integrated system, which is something no other vendor can claim. 

In addition, Fortinet’s security platform leverages open standards and APIs to ensure deep and seamless integration with third-party solutions. Fortinet’s Fabric-Ready partner program, and affiliated vendors who leverage our open API environments, constitutes one of the most extensive security partnership programs in the industry.

And we couple this with extensive alliances with industry organizations such as the Cyber Threat Alliance (CTA). We maintain a permanent seat on the World Economic Forum’s Centre for Cybersecurity – where we are actively engaged in addressing the global cybersecurity skills gap. We deliver skills training through partnerships with over 200 academies, educational institutions, and non-profits located in over 60 countries. And we have active working partnerships with organizations such as Interpol and NATO to protect individuals, businesses, and governments.

The recent introduction of additional free cybersecurity courses further builds on Fortinet’s existing efforts to address the cyber skills gap through training and education. Fortinet established the Network Security Expert (NSE) Institute in 2015, comprised of the Fortinet Network Security Academy (FNSA) program, the Authorized Training Center program, the Fortinet Veterans (FortiVet) program and the NSE training and certification program which to date has issued more than 350,000 Network Security Expert certifications.  

Fortinet Leads the Market in Security Innovation 

The biggest challenge that the digital world faces is that the majority of the security industry is already years behind, and this is just the start. And as networking functions begin to converge even further, creating the next generation of smart environments – including cars, buildings, cities, and critical infrastructures – the lack of security tools capable of inspecting and protecting these hyperfast, hyperconnected, and hyperscalable environments stands to severely impact our digital economy – and our way of life.

Organizations can’t wait for security vendors to catch up so they can protect and defend the “networks of tomorrow.” Networks are being left exposed right now because the traditional security solutions they have in place are just not up to the task. Fortinet is the first security manufacturer to step up to the plate to meet the demands of these networks, and we urge other security vendors to join us in delivering the next generation of security performance and scalability necessary for securing the global digital economy.

As Fortinet partners, Net Universe offers all Fortinet devices and subscriptions with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/fortinet.
You can visit our Shop Online

Sophos Firewall Manager SFM 17.1 MR3 Released – Release Notes & News – XG Firewall

Hi XG Community!

We’ve released Sophos Firewall Manager SFM 17.1 MR3. Initially, the firmware will be available by manual download from the Licensing Portal. We will gradually release the firmware via auto-update to customers.

  • NCCC-9988 [SFM] SFM authentication bypass
  • NCCC-10011 [SFM] Unable to activate the SFM device

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Remote sales: Manage your sales territories from anywhere

Thinking outside the box and broadening your perspectives often requires questioning your basic assumptions. It’s common to hear that uniformity always produces positive outcomes. However, too much single-mindedness can actually produce inadequate results when it comes to crafting unique solutions required to close a deal.

Every industry, market, and customer is unique. Customizing your sales pitch to fit your audience can make a huge difference. With the sheer volume of factors to consider, it’s important to create dedicated teams to develop and execute strategies that work best for each of your sales territories. This requires research, analysis, and well-trained sales reps who can take proactive measures to communicate with your target groups from anywhere!

Zoho CRM offers tools for proper segregation of teams and omnichannel connectivity to ensure that the show goes on, even if teams work remotely. Take a look at the following steps on how to get started.

#1 Define your differentiators

 A strong foundation for a “divide-and-conquer” sales territory strategy requires identifying accurate criteria to differentiate markets and customers.

For example, the sales team of a US-based business starts to notice that a few countries in South America have been purchasing a specific product line, as compared to others. After some research, the sales team discovers that low-performing countries have a specific customs policy in place related to their industry. Hence, this gives the team an alternate angle of differentiation. They create separate territories for countries with and without such customs policies and assign teams respectively. This creates focused tasks that help specific teams educate themselves about trade laws, and modify their sales approach and messaging accordingly, without having to juggle other accounts or tasks.

Zoho CRM provides you with the tools to group your customer accounts, contacts and deals into different territories based on location, industry, deal size, and any other defining factors. You can also create sub-territories to take an even more granular approach.

#2 Define your targets

Companies work best when they follow their overarching aspirations—to be a market leader, to change the way things are sold, to make markets more inclusive. Goals are a subset of these broad statements that provide the necessary momentum for your processes.

Revenue, the volume of customers, and units sold are just a few examples of metrics you can use to track progress toward your goals. Be thoughtful about which metrics you choose, because they will form the basis for your entire sales strategy for a specific region, or across the whole company.

Set monthly and quarterly targets according to territories and team hierarchy with Zoho CRM. Customize viewing permissions to ensure that only relevant teams or individuals can view the sales figures.

#3 Define your teams

Unique goals and mission statements require a diverse set of individuals to come together.

Don’t be overwhelmed by your organizational structure when you are assembling your teams. Zoho CRM has in-depth privacy settings that allow you to share reports and documents across territories and roles.

A senior manager doesn’t have to wait for information from a field or general sales rep. Viewing permissions can be set based on a hierarchy where a senior employee’s user profile settings allow access to collaterals and sales details of reps reporting to them. Similarly, viewing permissions can be restricted or allowed between sales territories managers or the CEO, to create healthy competition or analyze trends they are noticing among territories respectively.

#4 Track results

Whether you’re considering a deal or a diet, keeping track of numbers and trends is essential to staying motivated. Identify your star performers, and shuffle team members, if necessary. Dashboards available in Zoho CRM offer flexible layouts and metrics that support your unique management style. You can also share or restrict data views to teams or individuals, and export data as a report, sheet, document, PDF, or any other format you choose.

Companies, movements, and families harness their collective power to reach their common goals. However, these different groups are all-powerful because of the individuals within them that bring their own contributions to the table.

Check out how Zoho CRM can help you and your team go the extra mile with informing your actions and project plans.

Note: This is the fifth post in a series of blogs focused on how Zoho CRM can help you sell remotely, from the comfort of your homes. You can find the entire blog collection here.

Net Universe offers all Zoho subscritpions and consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/zoho.

Waste Management, Inc. Adopts Fortinet’s Secure SD-WAN All-in-One Solution

We recently spoke with Tim Stuart, Enterprise Voice and Network Director of Waste Management, to discuss how Waste Management was able to address their evolving business requirements by implementing Fortinet Secure SD-WAN. Stuart also shared best practices and lessons learned for deploying on such a large scale. 

Waste Management, Inc., the largest waste management and environmental services company in the US, provides services that range from collection and disposal to recycling and renewable energy generation. As their organization continued to expand, and they began to integrate digital innovation into their business processes, it was imperative to Waste Management that they could expand and contract network communications as needed. This was even more important as they needed to rapidly transition their workforce to remote work as a result of COVID-19.

By converting their router-based WAN infrastructure to Fortinet’s Secure SD-WAN solution, Waste Management was able to leverage the Fortinet Security Fabric to tie their security and networking elements together. They were also able to easily support their employee’s transition to telework with their existing Secure SD-WAN deployment.

Waste Management’s Objectives

Today’s branch offices have complex requirements that legacy routers, and even most SD-WAN solutions have simply not been designed to address. The goal of Waste Management was to reduce costs and centralize security management across their distributed organization, and they were looking for a high-performance security solution that would meet both their business and employee needs. They began by looking for a cybersecurity solution that could:

  • Reduce overall costs and operating expenses by migrating from static MPLS to multi-broadband.
  • Improve user experience and the performance of applications by prioritizing business-critical applications and enabling branches to directly communicate with the internet.
  • Increase visibility to reduce the time needed to remediate user-impacting issues.
  • Eliminate expensive 3rd-party services through a single interface, and unify the management of SD-WAN, including optimization and security.

Replacing Complexity with Improved Operations

In an attempt to gain full visibility, control, and decision-making capabilities through enhanced data correlation and integration between its various security elements, Waste Management had employed a WAN infrastructure that relied on routers and expensive MPLS circuits to connect their remote locations. This solution also included a variety of point products to provide both connectivity and security. 

However, not only did they not function as an integrated system, they had also introduced application performance and limited visibility challenges. And they still needed to rationalize their security product inventory and centralize security management to more efficiently and securely interconnect their recycling facilities, landfills, and transfer stations. 

“We were looking for something that we could go to improve that service so we started looking at the different industries and SD-WAN caught our attention and we started looking at what solutions were out there. We needed to get into modern speeds to be able to handle modern applications and a solution that would provide us the speed, security and ease of deployment and that’s what really drove us towards the Fortinet solution and got us to where we’re at today.” 

– Tim Stuart, Enterprise Voice and Network Director of Waste Management

After an internal analysis of different solutions, they found that the Fortinet Secure SD-WAN solution enabled them to meet all of their objectives. Its Security-Driven Networking approach, powered by the Fortinet Security Fabric, enabled them to combine their security and networking solutions into a single, integrated system. This enabled them to successfully manage all 1200 locations while reducing WAN costs, improving business application SLA, and simplifying overall management with best-of-breed security and performance. 

The addition of the Fortinet SD-Branch solution then enabled them to seamlessly extend that security functionality deep into each local branch network by combining Secure SD-WAN with LAN switching, wireless access, and LTE (3G/4G) extensions.

The Advantages of Secure SD-WAN and SD-Branch

Fortinet Secure SD-WAN delivers vastly improved application performance by routing traffic over the most efficient WAN connection. Since resource allocation and dynamic connectivity are automated, once basic connection, security, and minimum bandwidth policies are set, the process of maintaining and managing an adaptable software-defined network is now simple and easier than ever. This is a significant benefit for organizations, since they often have multiple locations and thousands of employees with limited security resources and must accomplish all network administration from a centralized location. 

As a result of implementing Fortinet’s Secure SD-WAN and SD-Branch solutions, Tim and his team had access to the powerful security tools included in the FortiGate NGFW security appliance – including firewall, IPS, antivirus, web filtering, and sandboxing – combined with a full suite of essential connectivity, bandwidth management, and application recognition tools. 

Because these tools and services are integrated into a single, holistic solution, Waste Management was able to ensure the reliable delivery of even their most latency-sensitive business applications. And in addition to immediately seeing a significant difference in their application performance, they also saw enhanced security, increased visibility, and simplified management ­– all while reducing their WAN overhead.

“We took the Fortinet solution because it has a centralized operation in zero-touch deployment that worked perfect and it was a very easy platform to troubleshoot on and it also had great visibility force, along with security in the price for the performance. I mean, that’s really why we drove it down. We were looking for price stability and speed of deployment because the telco vendor that we were dealing with did not meet our needs. If we needed to make a change within our network, Fortinet made it possible.”

– Tim Stuart, Enterprise Voice and Network Director of Waste Management

Business Impact

By selecting and deploying the Fortinet Secure SD-WAN and SD-Branch solutions, Waste Management immediately received the following benefits:

  • Reduced WAN costs by converting from expensive MPLS circuits to broadband connectivity and Direct Internet Access over the public network.
  • Improved application user experience through granular application identification and steering to ensure that business critical applications maintain optimal performance.
  • Enhanced protections by deploying Secure SD-WAN’s full stack of integrated security solutions at every location. 
  • Scalable and simplified management through integrated SD-WAN optimization, branch access, and switching functionality, all seamlessly integrated with comprehensive security capabilities.
  • Increased visibility due to Secure SD-WAN’s ability to integrate connectivity, traffic management, access control, and security into a single, centralized administration platform.

“It was important to find a device that fit all of our needs, not only our network but also security and that’s what drove us to Fortinet, not to mention the 20 million dollars a year that we saved in doing.”

– Tim Stuart, Enterprise Voice and Network Director of Waste Management

Hear the full discussion and learn how Waste Management transformed their network to reduce cost by 65% and improve the application experience.

Take a security-driven approach to networking to improve user experience and simplify operations at the WAN edge with Fortinet’s Secure SD-WAN solution.

Read these customer case studies to see how De Heus and Burger King Brazil implemented Fortinet’s Secure SD-WAN to alleviate network complexity, increase bandwidth, and reduce security costs.

Engage in our Fortinet user community (Fuse). Share ideas and feedback, learn more about our products and technology, or connect with peers.

As Fortinet partners, Net Universe offers all Fortinet devices and subscriptions with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/fortinet.
You can visit our Shop Online

Embracing a new digital market with Zoho One – Crown Bees’ Story

Note: This story is part of #ZohoInfluence, a program focused on sharing experiences and advice from our customers. Click here to see more from Zoho Influence. 

“Our company is so nimble now that we have these tools to help us make these decisions and react really quickly.” 

We spoke to Karl Alexander of Crown Bees about how the company has been able to use Zoho One to pivot to remote work, and how they achieved such success with their new webinars.

Based just outside of Seattle, Washington, Crown Bees realized early that major changes were going to be needed to accommodate a new way of doing business as work moved to the home and online presence became more important. Karl Alexander, marketing director at Crown Bees, has been pushing the company to the cloud for some time now, so they were ready to take on this new challenge quickly. First, they evaluated what needed to be prioritized as work moved to the home.

Crown Bees decided to rethink how it communicates with customers while most people are stuck at home. They decided to offer a live webinar to not only offer useful information to customers, but also provide a community space of sorts. This was the first time Crown Bees tried a webinar, so they needed to decide on not only what they were going to say, but also their tone. By making a report of the tickets they had accumulated in Zoho Desk, their customer support solution, they were able to address the most common customer questions in the webinar. They also wanted to make sure their webinar provided helpful information about mason bees in general, instead of simply advertising their products, a choice that they made to ensure their material was informative and useful to the widest range of viewers.

“We wanted to make it a fun community forum, like a bunch of gardeners getting around and just talking about plants and bees and growing things.”

By addressing both the community and the informational needs of their customers, Crown Bees was able to offer a truly unique experience. The next step was figuring out how to get people there.

Crown Bees put together an email campaign with Zoho Campaigns, targeting customers to make sure they only invited those for whom the webinar would be relevant. Using a mixture of Adobe Spark and Zoho Social, they created and monitored social media campaigns to promote the webinar, both through Facebook and Instagram. The first webinar had less than one week of lead time, so no one was sure what kind of response it would get.

They also used Zoho MarketingHub, a marketing automation solution, to create targeted pop-ups on their site. When customers visited specific pages, a pop-up would display for the webinar. Alexander said, “The response was overwhelming. The webinar filled up within the first 48 hours. We had no idea which channel was going to get the most people, and it turned out that the targeted pop-ups through MarketingHub were really the major driver. We got so many people that we had to increase our maximum attendees for the webinar.”

Five minutes after starting their webinar on Zoho Meeting, they had 250 attendees listening in. Both this webinar and the second one went overtime and maintained high levels of engagement throughout. By monitoring the analytics through Zoho Meeting, Crown Bees determined that 80-90% of their audience stayed for the entire webinar. The following day, Alexander saw “one of the most dramatic spikes in web traffic and sales that [Crown Bees] had seen since last year when [they] had a huge sale.”

To market the next webinar, Alexander took what he learned from the first one and refined the process further. He saw that the Zoho MarketingHub pop-ups had worked, but also saw people talking about the event on Facebook. By monitoring the social media interaction with Zoho Social, Crown Bees was able to determine what exactly had been so successful about that first webinar. They figured out it came down to the live interaction with the Crown Bees staff and the time it was being held, so they were able to maintain and emphasize those elements the next time around.

Because they had collected so much data and questions from the polls and Q&A, they were able to create and send out email campaigns with Zoho Campaigns to make sure any questions not answered in the webinar were still answered after the fact, and so they could tailor the next presentation to be even more helpful.

Check out Crown Bees website here to see what they’re all about and join their next webinar.

Net Universe offers all Zoho subscritpions and consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/zoho.

Streamlining paperwork with Zoho Sign for Google apps

The widespread recent adoption of social distancing measures has necessitated several tech companies, including us at Zoho, ramp up services and strengthen apps with remote working capabilities. This supports businesses reeling from the COVID-19 pandemic, preventing them from being immobilized further, and enables them to re-organize themselves and collaborate remotely over the internet.

Yet, conducting business—remotely or not—hinges on a substantial amount of paperwork being carried out, which can currently be a huge hurdle to organizations that follow the conventional pen-and-paper approach. A lot of manual effort across teams and departments may be required to get paperwork drafted, printed, signed, processed, and audited for a business to run its operations, which puts them in a precarious situation. Therefore, this is an opportune moment for businesses to go paperless by switching to a complete digital signature application like Zoho Sign, which can help digitize paperwork in a hassle-free, legal, and secure manner while reducing costs and turnaround time by up to 90%.

It’s no surprise, however, that when it comes to online business software, Google and its suite of applications are as ubiquitous and massive as things can get. With over two billion users collectively, a vast majority of the internet users and millions of businesses rely on Google products for their day-to-day activities. As a Google Cloud partner, Zoho has, over the years, built a plethora of integrations between the Zoho and Google software ecosystems to help our users manage their data. You can now add to that long list Zoho Sign’s integrations with popular Google products such as G Suite, Google Drive, Gmail, and Chrome, each of which are reported to have over a billion active users themselves.

Zoho Sign offers the convenience of initiating workflows and e-signing your business paperwork across these products from individual apps while storing all your documents in one place—regardless of where they originate—in a secure and organized manner for consolidated access and management. This can transform the way your company does paperwork, improve collaboration, and increase productivity immensely.

You can install these Zoho Sign integrations from the G Suite Marketplace and explore the various functionalities they offer, which are listed as follows.

Single sign-on: By installing the Zoho Sign add-on, you can log in to Zoho with your Google account. This avoids the hassle of having to remember multiple passwords and separately signing in with your Zoho credentials to access Zoho Sign.

Add G Suite users: The add-on lets you invite users from your G Suite organization to Zoho Sign. Once they accept the invitation, you can assign them roles and manage their access.

Sign and send documents for signatures from Google Drive: The add-on allows you to electronically sign Google docs and other documents in your storage—or send them out for signatures—directly from Google Drive using the Open with option. A copy of the signed documents will be automatically saved back to your storage in a folder named ZohoSignDocuments.

In addition, the Zoho Sign web application itself features a Cloud Picker tool that lets you import documents from Google Drive when setting up sign workflows and export the signed documents back to a specific folder in your storage. Furthermore, there is also an option to set up automatic backing up of your signed Zoho Sign documents to Google Drive in your account settings.

Launch Zoho Sign from the Apps launcher: The add-on also adds Zoho Sign to your Google apps, thus allowing you to launch it in a separate browser tab from the Apps launcher when using any application made by Google.

Add Zoho Sign to Google Chrome apps: Three out of every five internet users are said to use Google Chrome for browsing online. You can install our extension from the Chrome Web Store to add Zoho Sign to your apps on Chrome. This lets you launch Zoho Sign in just a couple of clicks on any Chrome tab or window.

Sign and send documents for signatures from Gmail: Our newly released add-on for Gmail allows you to digitally sign email attachments or set up esignature workflows to send them out for signatures to your contacts and others directly from your Gmail inbox.

Irrespective of how you access Zoho Sign and sign or send documents for signatures, you can manage them all centrally and track their status from the Documents tab in your Zoho Sign dashboard.

So, go ahead and use these integrations and let us know how they help you. If you have not used Zoho Sign yet, head over to zoho.com/sign and sign up for a free 14-day enterprise trial. For feedback, assistance, and demo requests, write to us at support(at)zohosign(dot)com.

Happy Signing!

Net Universe offers all Zoho subscritpions and consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/zoho.

Intercept X gets 100% in SE Labs testing – Sophos News

We are thrilled to announce that Intercept X received a 100% total accuracy rating in the enterprise, SMB, and consumer protection tests by SE Labs.

Whether you are protecting your employees at work, or them and their families at home, you will get outstanding protection with Intercept X technology.

The world’s best endpoint protection

Intercept X is the strongest endpoint security on the market, delivering more advanced protection in one solution than anything else out there.

Deep learning AI excels at detecting and neutralizing threats that have never been seen before. Anti-ransomware protection blocks malicious encryption processes and returns affected files to safe, unencrypted states. Advanced defenses against fileless, memory-based attacks keep your organization safe against the latest obfuscated, script-based threats.

Intercept X also includes options for Endpoint Detection and Response (EDR), so you can perform detailed threat hunting and IT security operations hygiene across your endpoints and servers, and a managed service (MTR) that gives you access to a team of Sophos cybersecurity specialists that will hunt threats and take appropriate action on your behalf.

Constant innovation

Our team of cybersecurity experts are constantly enhancing the powerful features in Intercept X. This year alone we’ve incorporated:

  • AMSI protection – enhanced protection against fileless attacks, such as obfuscated PowerShell scripts
  • Intrusion Prevention System – protects devices against network-based attacks (currently in early access)
  • EFSGuard, CTFGuard, and more

Try Intercept X for free

Testing the powerful features in Intercept X couldn’t be more straightforward. Take a free 30 day trial, or if you’d like to learn more head over to Sophos.com.

For a limited time, Sophos customers can add Sophos Home edition at no addition cost.

To view the detailed results from SE Labs: Enterprise | SMB | Consumer

 

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Microsoft knocks out 114 vulnerabilities in May, 2020 Patch Tuesday – Sophos News

In what has become a tradition, the second Tuesday of every month Microsoft releases security updates to Windows and other products. This month’s release fixes a total of 114 vulnerabilities, among which 17 are classified as Critical, and 93 as Important.

A total of 28 potential remote code execution (RCE) vulnerabilities have been fixed in Windows web components (such as the Edge or Internet Explorer browsers, or the ChakraCore Javascript engine), the Jet engine, and some Office components. Moreover, 56 local privilege escapation (LPE) bugs were also fixed, in the Windows kernel (mostly in Win32k, DirectX, or GDI) and also in some Windows services (such as Push Notification, Windows Error Reporting, and BITS).

As usual all the additional details can be found in the Security Update Guide Release Notes and users can download patches manually from the Microsoft Security Update Catalog.

Adobe usually times its updates to coincide with Microsoft, and this month release saw 21 bugs patched, all in their Acrobat Reader. With a criticality set as “Important,” all the bugs fixed classify as memory corruption vulnerabilities (null pointer, out-of-bound read, use-after-free) which can potentially lead to code execution on this victim’s host simply by opening a PDF document.

SophosLabs has investigated some of the more interesting vulnerabilities Microsoft fixed this month. Here are some highlights.

Windows Graphic Components

CVE-2020-1054,CVE-2020-1143
CVE-2020-0915,CVE-2020-0916,CVE-2020-0963,CVE-2020-1141,CVE-2020-1142,CVE-2020-1145
CVE-2020-1135,CVE-2020-1153

The graphic layers of Windows span many complex technologies, and therefore make up a huge attack surface. Attackers frequently look at these subsystems for vulnerabilities. This month, Microsoft fixed a total of 10 vulnerabilities affecting these core components, with risks going from simple kernel information leaks, up to local Elevation of Privilege (EoP).

One of the EoP vulnerabilities that stands out the most this month is CVE-2020-1054. This bug describes an out-of-bound write found in the syscall win32k!NtDrawIconEx,  which is responsible for drawing an icon into a specific handle of device context (HDC). Due to its very nature, any unprivileged Win32 application can invoke such a syscall, and therefore potentially elevate to SYSTEM.

In any case, one must bear in mind that, in order to be exploited, those bugs require access to a Windows graphical session, and also need to be able to execute code.

Web Browser memory corruption

CVE-2020-1037,CVE-2020-1056,CVE-2020-1059,CVE-2020-1096, CVE-2020-1062,CVE-2020-1092,CVE-2020-1093

ChakraCore, the JavaScript engine that powers the Edge web browser, suffers from multiple memory corruption  vulnerabilities.

If successfully exploited, these vulns could allow a remote attacker to execute code on the targeted host with the current user’s privilege simply by exposing a carefully crafted web page and either wait for a victim (or forcing them) to visit the page though XSS, CSRF, or OpenRedirect web vulnerabilities—or even through social engineering tricks.

Several vulnerabilities were also found in Internet Explorer 11 and VB scripting engine. Such vulnerabilities could also be exploited successfully as they rely on old (in some cases, unsupported) technologies, and cannot benefit from the protections modern browsers offer users.

Windows Services

CVE-2020-1084, CVE-2020-1123, CVE-2020-1137, CVE-2020-1081

Windows services are a great avenue for bugs, particularly (but not only) filesystem bugs – most notably by abusing symbolic links and junctions. As they require high privileges to run, successful exploitation of Windows services usually result in privilege escalation.

This month, Microsoft issued fixes for Windows services, such as:

  • Connected User Experiences and Telemetry Service
  • Background Intelligent Transfer Service (BITS)
  • Push Notifications
  • Printing

have also been targeted, and their vulnerabilities fixed in the April, 2020 Patch Tuesday. Many more bugs in Windows services were fixed this month, any of which could have potentially resulted in EoP. However, the company provided us with no technical details.

Although no vulnerability was reported as exploited in the wild, many vulnerabilities are rated as very likely to be exploited. Therefore, the simple precaution principle would dictate to patch as soon as possible, which is, regardless of any other layer of protection, always the best remediation.

How is Sophos responding to these threats?

Here is a list of protection released by SophosLabs in response to this advisory to complement any existing protection and generic exploit mitigation capabilities in our products.

 

How long does it take to have Sophos detection in place?

We aim to add detection to critical issues based on the type and nature of the vulnerabilities as soon as possible. In many cases, existing detections will catch exploit attempts without the need for updates.

What if the vulnerability/0-day you’re looking for is not listed here?

If we haven’t released an update for a specific exploit, the most likely reason is that we did not receive the data that shows how the exploit works in the real world. As many of this month’s exploits were crafted in a lab and have not been seen in the wild, nobody has enough information (yet) about how criminals would, hypothetically, exploit any given vulnerability. If or when we receive information about real attacks, we will create new detections, as needed.

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.