• Detecting exploitation of zero-day CVE-2021-40444 in Microsoft MSHTML

    by Bhabesh Raj Rai, Associate Security Analytics EngineerOn September 7, 2021, Microsoft released an advisory on [...]

  • How to detect stealthy Cobalt Strike activity in your enterprise

    Cobalt Strike, first released in 2012, is a commercial adversary simulation tool and is popular among red [...]

  • Fighting back against adversarial dominance

    Working with cybersecurity can feel like fighting a losing battle. Cybercriminals can access an organization’s [...]

  • Accelerate detection and response with MITRE ATT&CK®

    By Nils Krumrey, UK Presales Lead, LogPointCyberattacks are getting increasingly sophisticated, and attackers can circumvent [...]

  • Detecting PetitPotam – a relay attack that can compromise your domain without any authentication

    by Bhabesh Raj Rai, Associate Security Analytics EngineerOn July 19, 2021, security researcher Lionel Gilles [...]

  • Bridging the cybersecurity skills-gap with machine learning

    By Jon Gisli Egilsson, Engineering Manager, LogPointThe amount of cyberattacks continues to rise but the [...]

  • Launching LogPoint Community: Powered by the enthusiasm of LogPoint users

    Community brings customers, partners, and LogPoint experts together. LogPoint has launched LogPoint Community, a new [...]

  • Preparing your defenses against the terror of PrintNightmare

    by Bhabesh Raj, Associate Security Analytics EngineerOn Patch Tuesday for June 2021, Microsoft fixed a [...]

  • Accelerate detection and response with LogPoint and Palo Alto Networks Cortex XSOAR

    By Martha Chrisander, Head of Product Marketing, LogPointData breaches are expensive. IBM estimates that the [...]

  • Increase efficiency and easily share and update your alerts

    By Gitte Gade, Product Marketing Manager, LogPointIn addition to sharing analytics and dashboards, LogPoint 6.11 [...]

  • Detecting FiveHands ransomware at different stages of the kill chain

    by Bhabesh Raj Rai, Associate Security Analytics EngineerOn May 6, 2021, CISA released a report [...]

  • There’s a new ransomware in town: Detecting Egregor using LogPoint

    by Bhabesh Raj Rai, Associate Security Analytics EngineerEgregor, a variant of the Sekhmet ransomware family, [...]