• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
        • Security Maturity Assessment
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
        • Security Maturity Assessment
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    Active exploitation of the Oracle WebLogic Server RCE vulnerability (CVE-2020-14882)
    Active exploitation of the Oracle WebLogic Server ...

    Attackers are exploiting the Oracle WebLogic Server vulnerability. Learn how to detect the...

    Efficient control of access to patient data with Applied Analytics
    Efficient control of access to patient data with A...

    Applied Analytics is a solution for non-technical staff that gives insight into applications and...

    Logpoint Guide: What is log management, and why is it so important?
    Logpoint Guide: What is log management, and why is...

    Log management ensures that we capture logs before they are overwritten and disappear. Get to know...

    The complete guide to log analysis
    The complete guide to log analysis

    Modern businesses have become reliant on data analytics, especially within cybersecurity, IT...

    Microsoft Exchange Server RCE vulnerability (CVE-2020-0688)
    Microsoft Exchange Server RCE vulnerability (CVE-2...

    Unpatched Microsoft Exchange Servers are exposed to a remote code vulnerability. Learn how to...

    Threat hunting with Linux – Detecting a cryptomining attack
    Threat hunting with Linux – Detecting a cryptomini...

    Cryptomining activity spiked to unprecedented levels during mid-2019. Carry out threat hunting with...

    Guide to the MITRE ATT&CK Framework: What is it and how can it benefit you?
    Guide to the MITRE ATT&CK Framework: What is it an...

    The MITRE ATT&CK Framework is a cybersecurity knowledge base of adversary tactics. Learn about the...

    Detecting the Zerologon vulnerability in LogPoint
    Detecting the Zerologon vulnerability in LogPoint

    Microsoft has released a security advisory for a critical privilege escalation flaw. Detect the...

    Prometei botnet and its cryptomining shenanigans
    Prometei botnet and its cryptomining shenanigans

    A cryptocurrency mining botnet attack, Prometei, has been quietly active since March. Learn how...

    Detecting Tor use with LogPoint
    Detecting Tor use with LogPoint

    CISA along with FBI released an advisory on Tor recommend that organizations assess their risk of...

    Detection of wormable RCE vulnerability in Windows DNS server
    Detection of wormable RCE vulnerability in Windows...

    Microsoft has released a total of 123 fixes. 18 are critical and impact Windows Server and Office...

    Explained SIEMply: Machine Learning
    Explained SIEMply: Machine Learning

    Machine learning is a branch within the artificial intelligence (AI) tree of technology. Learn more...

    4 5 6 7 8
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy