HarfangLab
The Blog
Cyber Threat Research: 2025 wrap up
Gamaredon, SadFuture, Ivanti CSA vulnerabilities, UAC-0057… what did HarfangLab CTR Team discover in 2025?
CISO, CEO, CIO: Shared agendas and priorities for 2026
CISOs are at the heart of cyber, technical, and business challenges. How can they develop a security strategy that addresses…
Ransomware: A Threat Landscape Study
Advanced techniques, cybercrime syndicates, and the sheer number of attacks: ransomware is evolving constantly and rapidly. In the face of…
Workspace Security Platform: A response to changing cyber practices
What is a Workspace Security Platform? According to Gartner, a Workspace Security Platform brings together the techniques and tools used…
Vulnerability management: solutions, methods, and tools
More than 40,000 CVEs (Common Vulnerabilities and Exposures) recorded in 2024. That’s an increase of nearly 39% compared to 2023.…
Support and product roadmap: why they are important when choosing a cybersecurity platform
The detection and protection capabilities of a security solution are essential, but other criteria are also important to define the…
Cybersecurity and sovereignty: understanding the stakes and choosing the right solution
Sovereignty is a prerequisite for sensitive sectors and public institutions, and today’s geopolitical turbulence has brought this concept into sharp…
[Report] Cybersecurity: European businesses are increasingly concerned about sovereignty
HarfangLab 2025 report based on research by Sapio Research reveals that 83% of French and 81% of German business leaders…
How cybersecurity solutions manage their own vulnerabilities
Vulnerabilities have increased by 38% in just one year, according to a 2024 report by Advens CERT. While organizations are…
AI and cybersecurity: threats, responses, and future development
AI and security are bound for better or worse: cybercriminals are using it to attack faster and harder. In the…
Critical National Infrastructure (CNI) and Data Protection: from supply chain attacks to On-Prem defenses
Companies and public organizations are routinely targeted by cybercriminals and state-sponsored organizations alike, with attacks spanning ransomware, espionage-motivated intrusions, and…
On-Premises EDR: a guide to choosing the right tool
An On-Premises EDR is not always an option. The choice may be guided by data confidentiality issues or even be…