Understanding Behavior of Hacker
Blog 16 Feb 2022

Understanding Behavior of Hacker

Understanding hacker's behavior may lead us to several ways in preventing and managing their bad characteristis realise into our webpages. 
Malware Attack Can Cause Terrible Outcome to Your Business
Blog 23 Dec 2021

Malware Attack Can Cause Terrible Outcome to Your Business

Malicious attacks seem to get more sophisticated every year. Because malware (malicious software) is often difficult to detect, and devices are typically infect...
Web Defacement Detection Trends
Blog 15 Nov 2021

Web Defacement Detection Trends

From FIM and HIDS up to Image Object Recognition, the trends of web defacement detection are continuing to evolve. This push and challenge us to always update t...
How Hackers Exploit Weak Passwords
Blog 18 Oct 2021

How Hackers Exploit Weak Passwords

Many users are still careless about their passwords. Weak passwords 'invite' hackers to conduct certain activities such as brute force to login to our software ...
Rules of Hacked Website Portfolio
Blog 12 Oct 2021

Rules of Hacked Website Portfolio

SentryPage follows some rules that were applied in a website that contains hackers' portfolios. How the rules work will be explained below.