What is the MITRE ATT&CK Framework? Cybersecurity criminals around the world are constantly...
By Bhabesh Raj Rai, Associate Security Analytics Engineer, LogPoint On August 11, 2020, ...
By Bhabesh Raj Rai, Associate Security Analytics Engineer, LogPoint On July 1, 2020, the...
By Guy Grieve, LogPoint Presales Manager, EMEA A key difference between the computer and...
By Sandeep Sigdel, Lead Architect Security Analytics, LogPoint In organizations using AD and...
RYUK, a highly targeted ransomware campaign has been rearing its head over the past weeks. The...
Hidden Cobra is an APT hacking group mostly targeting against media organizations, aerospace,...
A new ransomware outbreak named “Petya”, similar to the WannaCry malware was seen on June 27,...
There are almost as many definitions of Threat Intelligence as there are security vendors! In...
By Julien Soukhavong, Security Consultant, November 16, 2016. Feedback from correlated events...
By Claus Løppenthien, Senior Solutions Specialist, October 27, 2016. Updated March 2023 ...
By Thomas Have, VP Product Development, 22 August 2016 Welcome to the second instalment of our...