Our Blog
Home / Blog
How secure is your workforce identity? Check your organization’s identity health now!
On Identity Management Day, it’s time for businesses of all sizes to take the our workforce identity audit. Saying the pandemic changed the way we work is an understatement. While the world has adapted to different forms of work—remote, hybrid, and work from...
How VAT-ready Software Helps Small Businesses to Grow in UAE
What is VAT accounting software? Value Add Tax or VAT is a consumption tax apply on a variety of goods and services which must be pay by the customer. The tax is calculate and applied to goods and services starting from manufacturing to the sale. A VAT accounting...
From the Shotgun Approach to Triple Extortion: The Evolving Ransomware Threat
From the Shotgun Approach to Triple Extortion: The Evolving Ransomware Threat . In the (relatively) brief history of computer crime, many kinds of attacks have, for one reason or another, become obsolete and faded from view. Ransomware, however, is only becoming more...
Collateral Damage — on Cybersecurity
Eugene KasperskyMarch 16, 2022 Eugene’s open letter in response to the warning against the use of Kaspersky products by the German Federal Office for Information Security (BSI). In the last three weeks, the war in Ukraine has shattered the world we knew. Families,...
How Device42 Helps You Remediate the Chromium Use-After-Free Zero-Day Exploit
Google reported their first 2022 zero-day vulnerability (CVE-2022-0609) in Chromium that threat actors are currently exploiting in the wild.This vulnerability affects all Chromium users, regardless of which OS is running. It includes browsers like Chrome and Microsoft...