• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a Demo

    Blog – Latest Research, Trends, and Insights

    Uncovering illegitimate Crypto-Mining Activity (Cryptojacking) in the Enterprise: Utilizing Network Logs for Investigation and Remediation
    Uncovering illegitimate Crypto-Mining Activity (Cr...

    By Swachchhanda Shrawan Poudel, Security Research Contents Crypto mining fast facts The...

    Critical Infrastructure: KRITIS – How does the German IT Security Act (BSI) impact cybersecurity?
    Critical Infrastructure: KRITIS – How does the Ger...

    by Sükrü ilkel Birakoglu, Senior Director The German IT Security Act 2.0 passed by the German...

    Embracing randomness to detect threats through entropy
    Embracing randomness to detect threats through ent...

    By Bhabesh Raj Rai, Security Research Contents What is Entropy? The calculation Use...

    Hive hunter: The tools and tactics to track down Hive ransomware
    Hive hunter: The tools and tactics to track down H...

    By Rabindra Dev Bhatta, Security Research Contents Fast Facts Technical analysis Hunting...

    A crowning achievement: Exploring the exploit of Royal ransomware
    A crowning achievement: Exploring the exploit of R...

    By Anish Bogati, Security Research Contents Fast Facts Royal analysis Analysis of an...

    A crowning achievement: Exploring the exploit of R...

    By Anish Bogati, Security Research Contents Fast Facts Royal analysis Analysis of an...

    Cyber insurance paradigm shift: Protecting the business without the ‘hail mary’ remedy
    Cyber insurance paradigm shift: Protecting the bus...

    Ransomware attacks and their significant financial threat to organizations have contributed to...

    Text4Shell: Detecting exploitation of CVE-2022-42889
    Text4Shell: Detecting exploitation of CVE-2022-428...

    –Anish Bogati & Nilaa Maharjan; Security Research Index Remnant of Log4Shell? PoC of...

    Detect, prevent and respond: A deep dive on malicious DLLs
    Detect, prevent and respond: A deep dive on malici...

    by Nilaa Maharjan, Security Research Index Click the links and navigate to each section: ...

    Emerging Threat: Hunting LockBit Variations using Logpoint
    Emerging Threat: Hunting LockBit Variations using ...

    – Anish Bogati & Nilaa Maharjan; Logpoint Global Services & Security Research Executive...

    ProxyNotShell: Detecting exploitation of zero-day Exchange server vulnerabilities
    ProxyNotShell: Detecting exploitation of zero-day ...

    by Bhabesh Raj Rai, Security Research On September 29, 2022, Microsoft confirmed reports of...

    5 investments that every MDR should make
    5 investments that every MDR should make

    Managed Detection and Response (MDR) services play a hugely valuable role for their clients. ...

    1 2
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy