• Kangundo Road, Nairobi, Kenya
  • support@exoticdigitalaccess.co.ke
  • Opening Time : 07 AM - 10 PM

Blog

This AI-Powered Cybercrime Service Bundles Phishing Kits with Malicious Android Apps

A Spanish-speaking cybercrime group named GXC Team has been observed bundling phishing kits with malicious Android applications, taking malware-as-a-service (MaaS) offerings to the next level. Singaporean cybersecurity company Group-IB, which has been tracking the e-crime actor since January 2023, described the crimeware solution as a “sophisticated AI-powered phishing-as-a-service platform” capable of targeting users of more […]

Read More

The Sweeping AI Trends Defining the Future Data Center

2023 has been a breakthrough year for artificial intelligence. A decades-old concept previously relegated to sci-fi stories is now a mainstream tool that millions use in their everyday lives. Netflix users are getting personalized recommendations with the help of AI. Developers are using it to automate code reviews. Designers are using AI for new product […]

Read More
Base Operations raises $9.1 million to boost global threat intelligence

Chainguard raises $140 million to strengthen open source software security

Chainguard has completed a $140 million Series C round of funding led by Redpoint Ventures, Lightspeed Venture Partners, and IVP, bringing the company’s total funding raised to $256 million. Existing investors, including Amplify, Mantis VC, Sequoia Capital, and Spark Capital also participated in the round. Demand for the company’s Chainguard Images solution continues to see […]

Read More

Mistral AI unveils Mistral Large 2 amid rising AI competition

Charlie Dai, VP and principal analyst at Forrester, also noted that Mistral LLM-2’s advanced features in code generation, mathematics, reasoning, performance, and cost efficiency — designed to run efficiently on a single H100 node — along with its multilingual support and availability on major cloud platforms, will significantly enhance its competitiveness for enterprise clients in […]

Read More

Gauging system activity on Linux with dstat

Default dstat options Were you to use the dstat command with no options, the output would include a lot more details than you might expect and would look more like what you see below. $ dstat You did not select any stats, using -cdngy by default. —-total-usage—- -dsk/total- -net/total- —paging– —system– usr sys idl wai […]

Read More

China’s ‘Evasive Panda’ APT Spies on Taiwan Targets Across Platforms

A Chinese advanced persistent threat (APT) is upgrading its espionage capabilities by developing and iterating on malware across operating systems (OSes). Evasive Panda — which Symantec tracks as “Daggerfly” in a new blog post — has been known to target telecommunications companies, government agencies, NGOs, universities, and private individuals of interest to the Chinese state. […]

Read More