• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a Demo

    Blog – Latest Research, Trends, and Insights

    What is SIEM? The Ultimate Guide to Security Information and Event Management
    What is SIEM? The Ultimate Guide to Security Infor...

    Data protection and cyber threat detection are crucial for businesses in today’s landscape....

    PaperCut Vulnerability CVE-2023-27350: Detecting exploitation attempts
    PaperCut Vulnerability CVE-2023-27350: Detecting e...

    by Anish Bogati & Rabindra Dev Bhatta, Security Research – Updated May 8th 2023 PaperCut is...

    Phishing: Logpoint SOAR deep dive – Achieving a 77% reduction in time to resolution
    Phishing: Logpoint SOAR deep dive – Achieving a 77...

    Phishing is a cyber-attack where an adversary sends fraudulent emails, text messages, or other...

    Detecting and Responding to Trojanized 3CX Desktop Applications
    Detecting and Responding to Trojanized 3CX Desktop...

    By Santosh Nepal and Anish Bogati; Security Research Updated on 21st April Quick Digest: When...

    CVE-2023-23397: Detecting exploitation of zero-day Exchange server vulnerabilities
    CVE-2023-23397: Detecting exploitation of zero-day...

    by Nilaa Maharjan and Anish Bogati, Security Research A serious vulnerability tagged ...

    Introducing AgentX: Improve detection and remediation of threats in endpoints
    Introducing AgentX: Improve detection and remediat...

    By Sergio Lozano Álvarez, Product Marketing Manager Many mid-size organizations lack the...

    Hacker as a Service: What is HaaS?
    Hacker as a Service: What is HaaS?

    Cybersecurity has become a major concern for businesses and individuals alike. With the...

    Hunting and remediating BlackCat ransomware
    Hunting and remediating BlackCat ransomware

    By Anish Bogati and Bibek Thapa Magar; Security Research TL;DR Known by many names,...

    Critical Infrastructure: What is NIS2?
    Critical Infrastructure: What is NIS2?

    The EU is often looked too as a global cybersecurity leader. And NIS2, a new EU policy in...

    Critical Infrastructure: Cybersecurity and the energy sector
    Critical Infrastructure: Cybersecurity and the ene...

    Digitalization has brought huge benefits to energy sector businesses. Internet of Things...

    What is a Managed Security Service Provider (MSSP)?
    What is a Managed Security Service Provider (MSSP)...

    A Managed Security Service Provider (MSSP) facilitates managed security services for the end...

    Emerging Threat: A Spool’s Gold: CVE-2022-21999 – Yet another Windows Print Spooler Privilege Escalation
    Emerging Threat: A Spool’s Gold: CVE-2022-21999 – ...

    by Nilaa Maharjan Logpoint Global Services & Security Research What is SpoolFool...

    1 2 3 4 5
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy