• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a Demo

    Blog – Latest Research, Trends, and Insights

    Citrix Vulnerabilities Rising – When Gateways Give Way
    Citrix Vulnerabilities Rising – When Gateways Give...

    Citrix has issued an urgent warning about multiple vulnerabilities in NetScaler ADC and...

    Akira in the Network: From SonicWall Access to Ransomware Deployment
    Akira in the Network: From SonicWall Access to Ran...

    SonicWall confirms active exploitation of an as-yet-unnamed 0-day on their Gen 7 firewalls’...

    APT28’s New Arsenal: LAMEHUG, the First AI-Powered Malware
    APT28’s New Arsenal: LAMEHUG, the First AI-Powered...

    Over the past few years, we’ve all been aware of the devastating war that has unfolded between...

    ToolShell: When SharePoint Becomes a Gateway to RCE
    ToolShell: When SharePoint Becomes a Gateway to RC...

    By Ujwal Thapa and Anish Bogati; Security Research Microsoft’s Security Response Center (MSRC)...

    Boosting Threat Detection with NDR and Logpoint SIEM
    Boosting Threat Detection with NDR and Logpoint SI...

    2 July 2025, 10:30 – 11:15 Join us for an exclusive live webinar, where Paul Gower and...

    Sådan understøtter Logpoint NIS2-kravene til hændelseshåndtering
    Sådan understøtter Logpoint NIS2-kravene til hænde...

    D. 1 juli 2025, 10:30 – 11:15 Er din organisation klar til at leve op til de skærpede...

    The Impacket Arsenal: A Deep Dive into Impacket Remote Code Execution Tools
    The Impacket Arsenal: A Deep Dive into Impacket Re...

    In today’s evolving threat landscape, we continually see new threat actors emerge and novel...

    Frontline Intel: Pinpointing GRU’s TTPs in the Recent Campaign
    Frontline Intel: Pinpointing GRU’s TTPs in the Rec...

    Joint Cybersecurity Advisory (CSA) AA25-141Aexposes a sustained and multifaceted...

    Tricked by trust: How OAuth and device code flows get abused
    Tricked by trust: How OAuth and device code flows ...

    In today’s cloud-first environments, access tokens have become the new keys to the kingdom....

    Webinar: Elevate your security with Microsoft Defender XDR Integration
    Webinar: Elevate your security with Microsoft Defe...

    21 May 2025, 10:00 – 11:00 CET We’re excited to invite you to an exclusive webinar, where...

    Webinar on demand: The ROI of SOC
    Webinar on demand: The ROI of SOC

    Join cybersecurity leaders from G’Secure Labs and Logpoint as they break down what truly...

    Kubernetes Threat Hunting using API Server Audit Logs
    Kubernetes Threat Hunting using API Server Audit L...

    Kubernetes has emerged as the preferred platform for deploying and managing containerized...

    1 2 3 4 5
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy