• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a Demo

    Blog – Latest Research, Trends, and Insights

    Guide to the MITRE ATT&CK Framework: What is it and how can it benefit you?
    Guide to the MITRE ATT&CK Framework: What is it an...

    What is the MITRE ATT&CK Framework? Cybersecurity criminals around the world are constantly...

    Detecting the Zerologon vulnerability in LogPoint
    Detecting the Zerologon vulnerability in LogPoint

    By Bhabesh Raj Rai, Associate Security Analytics Engineer, LogPoint On August 11, 2020, ...

    Detecting Tor use with LogPoint
    Detecting Tor use with LogPoint

    By Bhabesh Raj Rai, Associate Security Analytics Engineer, LogPoint On July 1, 2020, the...

    Explained SIEMply: Machine Learning
    Explained SIEMply: Machine Learning

    By Guy Grieve, LogPoint Presales Manager, EMEA A key difference between the computer and...

    Abusing Exchange: One API call away from Domain Admin
    Abusing Exchange: One API call away from Domain Ad...

    By Sandeep Sigdel, Lead Architect Security Analytics, LogPoint In organizations using AD and...

    Detect RYUK ransomware with LogPoint
    Detect RYUK ransomware with LogPoint

    RYUK, a highly targeted ransomware campaign has been rearing its head over the past weeks. The...

    Hidden Cobra
    Hidden Cobra

    Hidden Cobra is an APT hacking group mostly targeting against media organizations, aerospace,...

    Petya/NotPetya ransomware
    Petya/NotPetya ransomware

    A new ransomware outbreak named “Petya”, similar to the WannaCry malware was seen on June 27,...

    Threat Intelligence: The other side of security
    Threat Intelligence: The other side of security

    There are almost as many definitions of Threat Intelligence as there are security vendors! In...

    How to: Create long-term complex correlations with alert feedback
    How to: Create long-term complex correlations with...

    By Julien Soukhavong, Security Consultant, November 16, 2016. Feedback from correlated events...

    How to reduce the impact of ransomware
    How to reduce the impact of ransomware

    By Claus Løppenthien, Senior Solutions Specialist, October 27, 2016. Updated March 2023 ...

    Normalization part II

    By Thomas Have, VP Product Development, 22 August 2016 Welcome to the second instalment of our...

    3 4 5 6 7
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy