HarfangLab
The Blog

DLL Sideloading: solutions to protect your workspace
From detecting the loading of suspicious libraries to blocking threats, how can you protect your workspace against DLL Sideloading attacks?

Cloud, On-Premises, Air-gapped: The impact of infrastructure on choosing your cybersecurity solution
The choice of cybersecurity tools, such as an EDR, must be consistent with the technical context, depending on whether an…

AI and cybersecurity: threats, responses, and future development
AI and security are bound for better or worse: cybercriminals are using it to attack faster and harder. In the…

MSSP services and benefits of a managed EDR
A Managed Security Service Provider (MSSP) operates cybersecurity solutions for organizations of any size. They provide peace of mind to…

Critical National Infrastructure (CNI) and Data Protection: from supply chain attacks to On-Prem defenses
Companies and public organizations are routinely targeted by cybercriminals and state-sponsored organizations alike, with attacks spanning ransomware, espionage-motivated intrusions, and…

On-Premises EDR: a guide to choosing the right tool
An On-Premises EDR is not always an option. The choice may be guided by data confidentiality issues or even be…

EDR & FIM: monitor file integrity and easily link to telemetry to improve protection
File Integrity Monitoring aims to verify and analyze the integrity of critical files.

Basic rules for good IT hygiene
The protection of an information system must be constantly adapted to keep pace with changing usage patterns and cyber threats.…

GDPR: what are your cybersecurity obligations?
GDPR requires companies to protect personal data. But what exactly does this regulation mean for your organization?

Tips to set up an effective backup system
Whether it’s espionage or a ransom demand, data is coveted by attackers. How can you establish an effective backup system…

Why set up crisis exercises?
As a CISO or SOC Manager, let’s assume you’re convinced of the benefits of crisis drills, but your IT department…

How HarfangLab EDR efficiently protects Linux endpoints
No threat can target Linux endpoints? Think twice. Ransomware attacks, cryptocurrency miners, web shells, and rootkits are often used to…