Blog 16 Feb 2022
Understanding Behavior of Hacker
Understanding hacker's behavior may lead us to several ways in preventing and managing their bad characteristis realise into our webpages.
Blog 23 Dec 2021
Malware Attack Can Cause Terrible Outcome to Your Business
Malicious attacks seem to get more sophisticated every year. Because malware (malicious software) is often difficult to detect, and devices are typically infect...
Blog 15 Nov 2021
Web Defacement Detection Trends
From FIM and HIDS up to Image Object Recognition, the trends of web defacement detection are continuing to evolve. This push and challenge us to always update t...
Blog 18 Oct 2021
How Hackers Exploit Weak Passwords
Many users are still careless about their passwords. Weak passwords 'invite' hackers to conduct certain activities such as brute force to login to our software ...
Blog 12 Oct 2021
Rules of Hacked Website Portfolio
SentryPage follows some rules that were applied in a website that contains hackers' portfolios. How the rules work will be explained below.