• Detecting Atlassian confluence remote code execution vulnerability (CVE-2022-26134) in Logpoint

    by Bhabesh Raj Rai, Security ResearchOn June 2, 2022, Atlassian released a security advisory for [...]

  • Detecting Follina: Microsoft Office remote code execution zero-day

    by Bhabesh Raj Rai, Security ResearchOn May 27, 2022, a security researcher highlighted a malicious [...]

  • Detecting high severity AD privilege escalation vulnerability

    by Bhabesh Raj Rai, Security Research In this month’s patch Tuesday, Microsoft fixed a high [...]

  • Business-critical applications: What are they and how do you protect them from cyberattack?

    by Aida Grollov, Product Marketing Manager, LogpointDid you know that SAP customers generate 87% of [...]

  • Emerging Threats: Buzz of the Bumblebee – A new malicious loader

    Nilaa Maharjan, Logpoint Global Services & Security ResearchThis blog post provides an overview of the [...]

  • Hunting and remediating ngrok tunnels using Logpoint

    by Bhabesh Raj Rai, Security ResearchAmong developers, ngrok is a popular reverse proxy utility for [...]

  • In-depth look at the NetWalker ransomware operators

    by Gustav Elkjær Rødsgaard, Junior Security AnalystIn 2019 Netwalker, a type of ransomware that is [...]

  • Detecting malicious macros is a vital tool in the fight against malware

    by Bhabesh Raj Rai, Security ResearchEven the most sophisticated and advanced state-sponsored attackers leave digital [...]

  • On Demand: Webinar – Bridging the SAP Security Gap in your Digital Transformation

    Security is a huge part of any digital transformation, however, according to a recent Ponemon [...]

  • Emerging Threats: Cyberattacks on the rise in the wake of the Ukraine crisis: 5 ways to strengthen cybersecurity defenses

    By Ivan Vinogradov, Security analyst, Logpoint, and Jan Quach, Global Director of Customer Success Engineering, [...]

  • Detecting PwnKit local privilege escalation vulnerability

    by Bhabesh Raj Rai, Security Research DepartmentOn January 25, 2022, Qualys disclosed the details of a memory [...]

  • SAP Security – Recommended Best Practices

    Our free guide “Meeting Information Security Standards with SAP Security” provides recommendations and best practices [...]