• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
        • Security Maturity Assessment
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
        • Security Maturity Assessment
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    Using LogPoint to detect ChainOfFools / CurveBall attack
    Using LogPoint to detect ChainOfFools / CurveBall ...

    ChainOfFools/CurveBall allows attackers to spoof certain cryptographic operations on Windows. See...

    LockerGoga ransomware
    LockerGoga ransomware

    LockerGoga ransomware strikes again! LogPoint’s LockerGoga malware application detects any malware...

    Abusing Exchange: One API call away from Domain Admin
    Abusing Exchange: One API call away from Domain Ad...

    Privilege escalation attacks targeting Microsoft Exchange is a serious risk. Get our...

    Detect RYUK ransomware with LogPoint
    Detect RYUK ransomware with LogPoint

    Learn how to detect RYUK Ransomware with LogPoint. Enter LogPoint's blog universe and stay...

    Fight off CMB Dharma ransomware with LogPoint
    Fight off CMB Dharma ransomware with LogPoint

    Learn how to fight off CMB Dharma Ransomware with LogPoint. Enter LogPoint's blog universe and stay...

    Prowli malware detection
    Prowli malware detection

    Learn how to detect Proxli Malware with LogPoint. Enter LogPoint's blog universe and stay...

    Hidden Cobra
    Hidden Cobra

    Learn more about the ATP hacking group Hidden Cobra. Enter LogPoint's blog universe and stay...

    Bad Rabbit ransomware
    Bad Rabbit ransomware

    Understand how Bad Rabbit Ransomwares work. Enter LogPoint's blog universe and stay up-to-date with...

    Petya/NotPetya ransomware
    Petya/NotPetya ransomware

    Learn how to detect Petya/ Non Petya Ransomwares with Logpoint. Enter Logpoint's blog universe and...

    Responding to the WannaCry malware
    Responding to the WannaCry malware

    Learn how to respond to the WannaCry Malware with LogPoint. Enter LogPoint's blog universe and stay...

    Threat Intelligence: The other side of security
    Threat Intelligence: The other side of security

    Learn how threat intelligence can safeguard your IT-Infrastructure. Enter LogPoint's blog universe...

    How to: Create long-term complex correlations with alert feedback
    How to: Create long-term complex correlations with...

    SIEM alerts from correlated events is highly useful for later analytics. LogPoint lets you create...

    4 5 6 7 8
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy