1,000+ Customers, 12 years of best-in-class solutions
SIEM
Automation
Case Management
Behavior Analytics
Product Security
SIEM Sizing Calculator
Product Demo Tours
Early Access Program
Marketplace
2024 Gartner® MQ™ for SIEM
Endpoint Security
Multitenancy
Private Data Control
SAP Security
MITRE ATT&CK Framework
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Emerging Threats
Webinars
Events
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Training
Documentation
Community
Logpoint Academy
Security Research
Latrodectus, also known as BlackWidow, was developed by the same creators of IcedID malware, notoriously [...]
There’s no doubt that open-source projects are immense contributors to the software ecosystem. With an [...]
Updated August 26, 2024Scheduled Tasks are the automated processes configured to run automatically at a [...]
In cybersecurity, vulnerabilities are like ghosts from the past, appearing unexpectedly and haunting us. Such [...]
Fast Facts OS Credential Dumping (T1003) is a critical cybersecurity threat. It involves stealing credential [...]
FAST FACTSKapeka, also known as KnuckleTouch, originally appeared in mid-2022 but was formally tracked in 2024 [...]
Fast facts:DLL side-loading is a technique for executing malicious payloads inside a masqueraded DLL by [...]
Introduction XZ Utils is a set of open-source compression utilities for compressing and decompressing files [...]
Fast facts Raspberry Robin, previously disseminated through USB drives, now employs Discord for distribution. The [...]
On February 19, 2024, ConnectWise issued a critical advisory concerning two highly concerning vulnerabilities, namely [...]
Fast FactsPikabot is a multi-staged backdoor trojan that emerged in early 2023.The most notable feature [...]
The Dukes, or Cozy Bear, is a heavily financed, deeply dedicated, and efficiently coordinated cyber [...]