Web Defacement Detection Trends
Blog 15 Nov 2021

Web Defacement Detection Trends

From FIM and HIDS up to Image Object Recognition, the trends of web defacement detection are continuing to evolve. This push and challenge us to always update t...
How Hackers Exploit Weak Passwords
Blog 18 Oct 2021

How Hackers Exploit Weak Passwords

Many users are still careless about their passwords. Weak passwords 'invite' hackers to conduct certain activities such as brute force to login to our software ...
Rules of Hacked Website Portfolio
Blog 12 Oct 2021

Rules of Hacked Website Portfolio

SentryPage follows some rules that were applied in a website that contains hackers' portfolios. How the rules work will be explained below.
Does Issue on Performance Indicates the Presence of Malware?
Blog 14 Sep 2021

Does Issue on Performance Indicates the Presence of Malware?

Traffic of visiting users is very important for an e-commerce site. Since decreasing traffic means reducing amount of conversions too. One of many causes of dec...
Defacement Can Create Fake News on a Crowdsourcing Site
Blog 14 Sep 2021

Defacement Can Create Fake News on a Crowdsourcing Site

Just several days ago, Wikipedia was having defacements. When a popular site like Wikipedia having digital vandalism, many users are hurt. They express their fi...