HarfangLab
The Blog

European Defense Platform: HarfangLab and Sekoia.io’s sovereign cyber response
The European Defense Platform is a joint initiative that brings together HarfangLab and Sekoia.io technologies to deliver a unified and…

EDR self-protection: how HarfangLab deals with attacks demonstrated by EDR-Freeze
Let’s take a closer look at how this attack technique works against EDRs and how HarfangLab defends against it.

Air-gapped EDR: how does it work?
Air-gap: definition An air-gapped infrastructure is a computer system that is totally cut off from external networks to guarantee maximum…

DLL Sideloading: solutions to protect your workspace
From detecting the loading of suspicious libraries to blocking threats, how can you protect your workspace against DLL Sideloading attacks?

EDR & FIM: monitor file integrity and easily link to telemetry to improve protection
File Integrity Monitoring aims to verify and analyze the integrity of critical files.

How HarfangLab EDR efficiently protects Linux endpoints
No threat can target Linux endpoints? Think twice. Ransomware attacks, cryptocurrency miners, web shells, and rootkits are often used to…

MITRE 2024: 100% detection and 99% accuracy
In its second participation in the MITRE Evaluations, HarfangLab reaffirms the excellence of its detection capabilities and achieves first-rate protection…

MITRE 2: The Return
HarfangLab took part in the MITRE assessments for the first time in 2023. Following last year’s success, 2024 presented new…

How and why we adopted Rust to develop our EDR
How did we switch from Python to Rust, and why? Beyond optimizing RAM and CPU consumption, how does this development…

Cybersecurity: why combine EDR and EPP
HarfangLab extends its protection with an EDR + EPP package. What are the technical advantages? What are the benefits for…

Perks of Sigma and YARA rules in an EDR
Sigma and YARA are rule formats for detecting threats – malicious behaviors and files (or binaries) respectively. What are the…

Cybersecurity: telemetry explained
What is the use of telemetry in cybersecurity? What are its uses and benefits for cyberanalysts? How is it collected,…