• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
        • Security Maturity Assessment
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
        • Security Maturity Assessment
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    Detect, manage and respond: Clop ransomware
    Detect, manage and respond: Clop ransomware

    TL;DR There is a growing complexity of ransomware development and threat actors who are...

    Hunting and remediating BlackCat ransomware
    Hunting and remediating BlackCat ransomware

    Read our Security Analytics blog. Protect your organization from the devastating effects of...

    Cyber insurance paradigm shift: Protecting the business without the ‘hail mary’ remedy
    Cyber insurance paradigm shift: Protecting the bus...

    Ransomware attacks and their significant financial threat to organizations have contributed to a...

    Emerging Threat: IcedID Beacon – Hunting, Preventing, and Responding to IcedID Malware using Logpoint
    Emerging Threat: IcedID Beacon – Hunting, Preventi...

    By Nilaa Maharjan, Security Research Index Why is this threat noteworthy? Ice-breaker #1....

    Text4Shell: Detecting exploitation of CVE-2022-42889
    Text4Shell: Detecting exploitation of CVE-2022-428...

    Analysis of cybersecurity vulnerabilities and the exploitation of Text4Shell. Detect, manage and...

    Detect, prevent and respond: A deep dive on malicious DLLs
    Detect, prevent and respond: A deep dive on malici...

    by Nilaa Maharjan, Security Research Index Click the links and navigate to each section: What are...

    Emerging Threat: Hunting LockBit Variations using Logpoint
    Emerging Threat: Hunting LockBit Variations using ...

    – Anish Bogati & Nilaa Maharjan; Logpoint Global Services & Security Research Executive Summary:...

    Critical Infrastructure: What is NIS2?
    Critical Infrastructure: What is NIS2?

    The EU is often looked too as a global cybersecurity leader. And NIS2, a new EU policy in...

    Critical Infrastructure: Cybersecurity and the energy sector
    Critical Infrastructure: Cybersecurity and the ene...

    Read: What's the impact on the energy sector from cyber threats and how can the sector protect...

    ProxyNotShell: Detecting exploitation of zero-day Exchange server vulnerabilities
    ProxyNotShell: Detecting exploitation of zero-day ...

    by Bhabesh Raj Rai, Security Research On September 29, 2022, Microsoft confirmed reports of...

    What is a Managed Security Service Provider (MSSP)?
    What is a Managed Security Service Provider (MSSP)...

    A Managed Security Service Provider (MSSP) facilitates managed security services for the end user....

    5 investments that every MDR should make
    5 investments that every MDR should make

    Managed Detection and Response (MDR) services play a hugely valuable role for their clients. Some...

    8 9 10 11 12
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2026, Logpoint. All rights reserved.│ Privacy policy