
Screen Capture / Screen Scraping
In just 60 seconds, Timothy Jenkins, Head of Cyber Defense Research, SentryBay, explains why Screen Capturing is a common tool used by insider and malware
Interactive learning resources for cybersecurity professionals
In just 60 seconds, Timothy Jenkins, Head of Cyber Defense Research, SentryBay, explains why Screen Capturing is a common tool used by insider and malware
In just 60 seconds, Timothy Jenkins, Head of Cyber Defense Research, SentryBay, reveals how Keylogging, often referred to as Keystroke Logging, is used by hackers
The emergence of a new variant of Snake Keylogger—commonly known as 404 Keylogger—marks a significant escalation in the evolution of credential-stealing malware. This threat, which
A high-severity security vulnerability (CVE-2024-12284) has been discovered in NetScaler Console (formerly NetScaler ADM) and NetScaler Agent, posing a risk of authenticated privilege escalation. If
In today’s interconnected world, securing your infrastructure is more critical than ever. With SentryBay’s Armored Client, we ensure that only authorized devices can connect to
Malicious Injection is a mechanism that malware or malicious users can use to modify how an application functions on the computer. From an unmanaged device
We support enterprises and their remote workers as they adapt to protect themselves in the constantly shifting threat landscape, allowing them to be resilient and productive whilst also being compliant with regulations.