• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
        • Security Maturity Assessment
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
        • Security Maturity Assessment
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    Emerging Threat: IcedID Beacon – Hunting, Preventing, and Responding to IcedID Malware using Logpoint
    Emerging Threat: IcedID Beacon – Hunting, Preventi...

    By Nilaa Maharjan, Security Research Index Why is this threat noteworthy? Ice-breaker #1....

    Text4Shell: Detecting exploitation of CVE-2022-42889
    Text4Shell: Detecting exploitation of CVE-2022-428...

    Analysis of cybersecurity vulnerabilities and the exploitation of Text4Shell. Detect, manage and...

    Detect, prevent and respond: A deep dive on malicious DLLs
    Detect, prevent and respond: A deep dive on malici...

    by Nilaa Maharjan, Security Research Index Click the links and navigate to each section: What are...

    Emerging Threat: Hunting LockBit Variations using Logpoint
    Emerging Threat: Hunting LockBit Variations using ...

    – Anish Bogati & Nilaa Maharjan; Logpoint Global Services & Security Research Executive Summary:...

    Critical Infrastructure: What is NIS2?
    Critical Infrastructure: What is NIS2?

    The EU is often looked too as a global cybersecurity leader. And NIS2, a new EU policy in...

    Critical Infrastructure: Cybersecurity and the energy sector
    Critical Infrastructure: Cybersecurity and the ene...

    Read: What's the impact on the energy sector from cyber threats and how can the sector protect...

    ProxyNotShell: Detecting exploitation of zero-day Exchange server vulnerabilities
    ProxyNotShell: Detecting exploitation of zero-day ...

    by Bhabesh Raj Rai, Security Research On September 29, 2022, Microsoft confirmed reports of...

    What is a Managed Security Service Provider (MSSP)?
    What is a Managed Security Service Provider (MSSP)...

    A Managed Security Service Provider (MSSP) facilitates managed security services for the end user....

    5 investments that every MDR should make
    5 investments that every MDR should make

    Managed Detection and Response (MDR) services play a hugely valuable role for their clients. Some...

    The first 5 tools needed for an MSSP’s locker
    The first 5 tools needed for an MSSP’s locker

    A Managed Security Service Provider’s (MSSP) number one priority is to ensure that clients stay...

    What the Quack: Hunt for the QBOT with Logpoint
    What the Quack: Hunt for the QBOT with Logpoint

    -Nilaa Maharjan Logpoint Global Services & Security Research Executive Summary: QakBOT, also...

    Detect, mitigate and respond to WDigest attacks with Logpoint
    Detect, mitigate and respond to WDigest attacks wi...

    by Nilaa Maharjan, Security Research Internal penetration testing often requires security...

    8 9 10 11 12
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy