• Use LogPoint to detect Pingback, an ICMP tunneler backdoor malware

    by Bhabesh Raj Rai, Associate Security Analytics EngineerOn May 4, 2021, Trustwave researchers released details [...]

  • Detecting attacks that target human error using the Damerau–Levenshtein distance

    by Bhabesh Raj Rai, Associate Security Analytics EngineerDetecting attacks that target human error using the [...]

  • Hunting for PsExec artifacts in your enterprise

    by Bhabesh Raj Rai, Associate Security Analytics EngineerHunting for PsExec artifacts in your enterprisePsExec is [...]

  • On Demand: Webinar – Solarwinds Hack: How can educational institutions prepare for what’s next?

    The “Solarwinds Hack: How can educational institutions prepare for what's next?” webinar is now available [...]

  • Women in Cybersecurity: LogPoint’s Martha Chrisander

    Martha Chrisander is the Head of Product Marketing in the LogPoint CTO Office. She [...]

  • Detecting Exploitation of chainable zero-days vulnerabilities in Microsoft Exchange server

    by Bhabesh Raj Rai, Associate Security Analytics Engineer On March 2, 2021, Microsoft released emergency [...]

  • Improving collaboration during investigation with LogPoint 6.10

    By Martha Chrisander, Head of Product Marketing, LogPoint LogPoint’s latest release helps security analysts work [...]

  • CVE-2021-3156: Sudo privilege escalation vulnerability hiding under the hood for 10 years

    By Bhabesh Raj Rai, Associate Security Analytics Engineer On January 26, 2021, the Qualys Research [...]

  • 2021 – An outlook from the office of the CTO

    By Christian Have, LogPoint CTO LogPoint's mission is about "creating the best SIEM in the [...]

  • Getting started with threat intelligence in LogPoint

    It's easy to integrate threat intelligence sources with LogPoint to help your organization understand its [...]

  • Behavioral approach to security

    Updated April 2023 Security practitioners should not assume that they can thwart all security [...]

  • On Demand: Webinar – How to Mitigate IoT Security Challenges

    The “How to Mitigate IoT Security Challenges” webinar is now available on demand.Watch the webinar [...]