• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    Detecting Follina: Microsoft Office remote code execution zero-day
    Detecting Follina: Microsoft Office remote code ex...

    by Bhabesh Raj Rai, Security Research On May 27, 2022, a security researcher highlighted a ...

    Detecting high severity AD privilege escalation vulnerability
    Detecting high severity AD privilege escalation vu...

    by Bhabesh Raj Rai, Security Research In this month’s patch Tuesday, Microsoft fixed a high...

    Emerging Threats: Buzz of the Bumblebee – A new malicious loader
    Emerging Threats: Buzz of the Bumblebee – A new ma...

    Nilaa Maharjan, Logpoint Global Services & Security Research This blog post provides an...

    Hunting and remediating ngrok tunnels using Logpoint
    Hunting and remediating ngrok tunnels using Logpoi...

    by Bhabesh Raj Rai, Security Research Among developers, ngrok is a popular reverse proxy...

    Emerging Threats: SpringShell, not Spring4Shell – A Blooming Hype
    Emerging Threats: SpringShell, not Spring4Shell – ...

    Nilaa Maharjan, Logpoint Global Services & Security Research This blog post provides an...

    Emerging Threats Protection: Defending against Russian cyber operations
    Emerging Threats Protection: Defending against Rus...

    Cyber threats have been rising since Russia began its war on Ukraine on February 24....

    Logpoint’s Top 5 SOAR use cases
    Logpoint’s Top 5 SOAR use cases

    Analysts are constantly swamped with alerts on a daily basis and that leads to repetitive,...

    In-depth look at the NetWalker ransomware operators
    In-depth look at the NetWalker ransomware operator...

    by Gustav Elkjær Rødsgaard, Junior Security Analyst In 2019 Netwalker, a type of ransomware...

    Detecting malicious macros is a vital tool in the fight against malware
    Detecting malicious macros is a vital tool in the ...

    by Bhabesh Raj Rai, Security Research Even the most sophisticated and advanced state-sponsored...

    Detecting PwnKit local privilege escalation vulnerability
    Detecting PwnKit local privilege escalation vulner...

    by Bhabesh Raj Rai, Security Research Department On January 25, 2022, Qualys disclosed the...

    Detecting, investigating and mitigating privilege escalation vulnerabilities to prevent full AD control
    Detecting, investigating and mitigating privilege ...

    by Bhabesh Raj Rai, Associate Security Analyst Engineer Recent Active Directory (AD)...

    Detecting Log4Shell requires more than just a SIEM
    Detecting Log4Shell requires more than just a SIEM

    by Bhabesh Raj, Associate Security Analyst Engineer and Kennet Harpsøe, Senior Cyber Analyst

    9 10 11 12 13
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy