
Keylogging / Keystroke Logging
In just 60 seconds, Timothy Jenkins, Head of Cyber Defense Research, SentryBay, reveals how Keylogging, often referred to as Keystroke Logging, is used by hackers
Interactive learning resources for cybersecurity professionals

In just 60 seconds, Timothy Jenkins, Head of Cyber Defense Research, SentryBay, reveals how Keylogging, often referred to as Keystroke Logging, is used by hackers

A high-severity security vulnerability (CVE-2024-12284) has been discovered in NetScaler Console (formerly NetScaler ADM) and NetScaler Agent, posing a risk of authenticated privilege escalation. If

In today’s interconnected world, securing your infrastructure is more critical than ever. With SentryBay’s Armored Client, we ensure that only authorized devices can connect to

Malicious Injection is a mechanism that malware or malicious users can use to modify how an application functions on the computer. From an unmanaged device

One of the oldest components of malware is Keystroke Logging (keylogging, keyloggers), despite being one of the earliest forms of malware, they remain a top

Screen Capture is a persistent threat to healthcare organizations from both malware and Insider threat actors. In this video we reveal how this lurking threat
We support enterprises and their remote workers as they adapt to protect themselves in the constantly shifting threat landscape, allowing them to be resilient and productive whilst also being compliant with regulations.