HarfangLab
The Blog

Loading...
File integrity monitoring

EDR & FIM: monitor file integrity and easily link to telemetry to improve protection

File Integrity Monitoring aims to verify and analyze the integrity of critical files.

Read more
4min
Product
Crisis Management Biases

How HarfangLab EDR efficiently protects Linux endpoints

No threat can target Linux endpoints? Think twice. Ransomware attacks, cryptocurrency miners, web shells, and rootkits are often used to…

Read more
4min
Product
Mitre Results - Cybersecurity Platform

MITRE 2024: 100% detection and 99% accuracy

In its second participation in the MITRE Evaluations, HarfangLab reaffirms the excellence of its detection capabilities and achieves first-rate protection…

Read more
3min
Product
Mitre Evaluations - Cybersecurity Platform

MITRE 2: The Return

HarfangLab took part in the MITRE assessments for the first time in 2023. Following last year’s success, 2024 presented new…

Read more
6min
Product
Cybersecurity - RUST

How and why we adopted Rust to develop our EDR

How did we switch from Python to Rust, and why? Beyond optimizing RAM and CPU consumption, how does this development…

Read more
8min
Product
Cybersecurity - Workspace Security Platform

Cybersecurity: why combine EDR and EPP

HarfangLab extends its protection with an EDR + EPP package. What are the technical advantages? What are the benefits for…

Read more
5min
Product
Cybersecurity YARA and Sigma rules

Perks of Sigma and YARA rules in an EDR

Sigma and YARA are rule formats for detecting threats – malicious behaviors and files (or binaries) respectively. What are the…

Read more
6min
Product
Telemetry - Cybersecurity

Cybersecurity: telemetry explained

What is the use of telemetry in cybersecurity? What are its uses and benefits for cyberanalysts? How is it collected,…

Read more
7min
Product
OpenCTI - HarfangLab EDR Connector

A connector with OpenCTI to optimize incident response

OpenCTI is a solution used by CTI teams, cyber analysts and many CERTs and SOCs. It’s an IOC (Indicator Of…

Read more
3min
Product
Cybersecurity - Workspace Security Platform

Cybersecurity: how EDR protects itself against attacks

As cyber-attack techniques become more sophisticated and increase in volume, so do the tools available to deal with them.

Read more
6min
Product
Telemetry - Cybersecurity

What is MISP?

Definition of MISP, perks and uses of this tool by HarfangLab’s Cyber Threat Intelligence teams to centralize detection rules, update…

Read more
5min
Product
Cybersecurity - Offensive vs. Defensive AI

Performance and detection: concrete applications of AI in cyber

How to optimize detection and remediation capabilities with Artificial Intelligence, while enabling users to benefit from continuous innovation and new…

Read more
4min
Product