Keylogging / Keystroke Logging
In just 60 seconds, Timothy Jenkins, Head of Cyber Defense Research, SentryBay, reveals how Keylogging, often referred to as Keystroke Logging, is used by hackers
The latest trends on cybersecurity, BYOD, AI, remote working and thought leadership posts and industry analysis from SentryBay and its executives
In just 60 seconds, Timothy Jenkins, Head of Cyber Defense Research, SentryBay, reveals how Keylogging, often referred to as Keystroke Logging, is used by hackers
A keylogger (keylogging, keystroke logging), is a tool that records every keystroke made by a user on a computer or mobile device.
Cyber Threat Radar – Prominent companies in the Philippines such as health maintenance organization Maxicare, Jollibee Foods Corporation, and the Maritime Industry Authority have experienced
Screen Capture malware is a form of malicious software that steals sensitive information from victims’ devices, particularly by gaining unauthorized access to the data displayed
Threat actors use DLL injection (DLL Hijacking, Malicious Injection) to disrupt VDI operations or to bypass security controls such as disabling screen capture blocking or
The 17th-annual Data Breach Investigations Report (DBIR) analyzed a record-high 30,458 security incidents and 10,626 confirmed breaches in 2023 – a two-fold increase over 2022.
We support enterprises and their remote workers as they adapt to protect themselves in the constantly shifting threat landscape, allowing them to be resilient and productive whilst also being compliant with regulations.