• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a Demo

    Blog – Latest Research, Trends, and Insights

    Why cyber sovereignty matters in today’s threat landscape
    Why cyber sovereignty matters in today’s threat la...

    Europe is in the middle of a geopolitical storm. Sabotage of undersea cables disrupts global...

    ToolShell: When SharePoint Becomes a Gateway to RCE
    ToolShell: When SharePoint Becomes a Gateway to RC...

    By Ujwal Thapa and Anish Bogati; Security Research Microsoft’s Security Response Center (MSRC)...

    Frontline Intel: Pinpointing GRU’s TTPs in the Recent Campaign
    Frontline Intel: Pinpointing GRU’s TTPs in the Rec...

    Joint Cybersecurity Advisory (CSA) AA25-141Aexposes a sustained and multifaceted...

    ClickFix: Another Deceptive Social Engineering Technique
    ClickFix: Another Deceptive Social Engineering Tec...

    Fast Facts ClickFix, first observed in mid-2024, represents a sophisticated form of social...

    EDR Killers: After All, EDRs Are Not Invincible
    EDR Killers: After All, EDRs Are Not Invincible

    Fast Facts: EDR Killers are a growing cybersecurity threat, gaining prominence in 2024 and...

    APT28: Inside Forest Blizzard’s New Arsenal
    APT28: Inside Forest Blizzard’s New Arsenal

    Fast Facts: The Cyber espionage group Forest Blizzard is attributed to the GRU (Russia’s...

    End of the year Report: The cybersecurity rollercoaster of 2023
    End of the year Report: The cybersecurity rollerco...

    Global cyber onslaughts were witnessed in 2023 across industries, affecting many...

    The ultimate SIEM pricing guide
    The ultimate SIEM pricing guide

    Choosing the right SIEM solution is a challenging task, especially when it comes to pricing...

    The difference between SIEM and EDR (SIEM vs EDR)
    The difference between SIEM and EDR (SIEM vs EDR)

    Sometimes different tools can have overlapping functionalities/capabilities, which may prove...

    CVE-2023-38831: WinRAR – Decompression or Arbitrary Code Execution
    CVE-2023-38831: WinRAR – Decompression or Arbitrar...

    By Nischal Khadgi, Swachchhanda Shrawan Poudel, and Anish Bogati – (Security Research Team) ...

    NIS2 Fines: An overview of possible penalties for non-compliance.
    NIS2 Fines: An overview of possible penalties for ...

    NIS2 builds on the requirements of the original directive; it still aims to protect critical...

    Threat Hunting: Collaboration. Harnessing the Power of Teamwork
    Threat Hunting: Collaboration. Harnessing the Powe...

    In today’s ever-evolving cybersecurity landscape, organizations face a growing number of...

    1 2
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy