November 2022 - Page 2 of 15 - Exotic Digital Access
  • Kangundo Road, Nairobi, Kenya
  • support@exoticdigitalaccess.co.ke
  • Opening Time : 07 AM - 10 PM
Who’s swimming in South Korean waters? Meet ScarCruft’s Dolphin

Who’s swimming in South Korean waters? Meet ScarCruft’s Dolphin

ESET researchers uncover Dolphin, a sophisticated backdoor extending the arsenal of the ScarCruft APT group ESET researchers have analyzed a previously unreported backdoor used by the ScarCruft APT group. The backdoor, which we named Dolphin, has a wide range of spying capabilities, including monitoring drives and portable devices and exfiltrating files of interest, keylogging and […]

Read More
Wondershare PDFelement: A Powerful and Affordable PDF Editor

Wondershare PDFelement: A Powerful and Affordable PDF Editor

In today’s market, many PDF editors can perform multiple tasks, from editing PDFs to converting a range of file formats into PDFs. With the number of PDF editors available today, it can be difficult to choose the best one tailored to your needs and budget. Options like Adobe Acrobat (the original PDF Editor) are quite […]

Read More
5 DNS services to provide a layer of internet security

5 DNS services to provide a layer of internet security

Having thorough IT security usually means having a layered approach. Basic antivirus, for instance, might catch PC-based malware once a user downloads it, but you could try to block it before it ever reaches the user device, or at least have another security mechanism in place that might catch it if the basic antivirus doesn’t. […]

Read More
How to embed Taskade on your website

How to embed Taskade on your website

Learn how to embed a Taskade project into a website or blog to simplify your workflow. Image: Luke Peters/Unsplash If you use Taskade as a project management tool, and you happen to have a website team members use, you might want to combine those two to make the workflow even easier. That’s the goal, right? […]

Read More
Getting Ahead of Zero Trust Challenges

Getting Ahead of Zero Trust Challenges

Zero trust is an identity-focused security framework that uses identity and access management (IAM), microsegmentation, and the principle of least privilege to independently assess user requests before permitting them access to corporate resources. This strategy holds true whether the request comes from within or outside the enterprise’s network perimeter. The zero-trust model works on the […]

Read More
Amazon Security Lake: Automatically centralize your security data

Amazon Security Lake: Automatically centralize your security data

Amazon Security Lake is a service that automatically centralizes an organization’s security data from cloud and on-premises sources into a purpose-built data lake in a customer’s AWS account so customers can act on security data faster. Amazon Security Lake manages data throughout its lifecycle with customizable data retention settings, converts incoming security data to the […]

Read More
Defeating Complexity with Cisco Enterprise Networking Innovations

Defeating Complexity with Cisco Enterprise Networking Innovations

This blog is a collaboration co-authored with Kamden Schewitz, Product Marketing Specialist   The IT industry is fast-paced and chaotic, a place where unpredictable business challenges often arise faster than they can be solved. Every day brings a new challenge, and the weight of connecting and securing that business lies heavy on the backs of […]

Read More
Large Screens & Foldables Tutorial for Android

Large Screens & Foldables Tutorial for Android

Learn how to build great user experiences for large screens & foldables in Android. Also learn how to design and test adaptive Android apps. Large screens are an important and fast-growing segment of active Android devices. There are more than 270 million large-screen Android devices in use. They include tablets, foldable devices and Chrome OS […]

Read More
New Flaw in Acer Laptops Could Let Attackers Disable Secure Boot Protection

New Flaw in Acer Laptops Could Let Attackers Disable Secure Boot Protection

Acer has released a firmware update to address a security vulnerability that could be potentially weaponized to turn off UEFI Secure Boot on affected machines. Tracked as CVE-2022-4020, the high-severity vulnerability affects five different models that consist of Aspire A315-22, A115-21, and A315-22G, and Extensa EX215-21 and EX215-21G. The PC maker described the vulnerability as […]

Read More