• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a Demo

    Blog – Latest Research, Trends, and Insights

    Detecting PetitPotam – a relay attack that can compromise your domain without any authentication
    Detecting PetitPotam – a relay attack that can com...

    by Bhabesh Raj Rai, Associate Security Analytics Engineer On July 19, 2021, security...

    Preparing your defenses against the terror of PrintNightmare
    Preparing your defenses against the terror of Prin...

    by Bhabesh Raj, Associate Security Analytics Engineer On Patch Tuesday for June 2021,...

    Detecting FiveHands ransomware at different stages of the kill chain
    Detecting FiveHands ransomware at different stages...

    by Bhabesh Raj Rai, Associate Security Analytics Engineer On May 6, 2021, CISA released a...

    Hunting for PsExec artifacts in your enterprise
    Hunting for PsExec artifacts in your enterprise

    by Bhabesh Raj Rai, Associate Security Analytics Engineer Hunting for PsExec artifacts in...

    What is ERP Security and Why Does it Matter?
    What is ERP Security and Why Does it Matter?

    Updated 16 May 2023 ERP (Enterprise Resource Planning) Security is the practice of taking...

    CVE-2021-3156: Sudo privilege escalation vulnerability hiding under the hood for 10 years
    CVE-2021-3156: Sudo privilege escalation vulnerabi...

    By Bhabesh Raj Rai, Associate Security Analytics Engineer On January 26, 2021, the Qualys...

    Getting started with threat intelligence in LogPoint
    Getting started with threat intelligence in LogPoi...

    It’s easy to integrate threat intelligence sources with LogPoint to help your organization...

    Behavioral approach to security
    Behavioral approach to security

    Updated April 2023 Security practitioners should not assume that they can thwart all security...

    GDPR compliance: What is GDPR and how can you ensure your business is compliant?
    GDPR compliance: What is GDPR and how can you ensu...

    Implementation of the General Data Protection Regulation (GDPR) in May 2018 revolutionized...

    Emotet: What you need to know about Emotet malware
    Emotet: What you need to know about Emotet malware

    In IT security circles, Emotet is one of the most notorious and prominent examples of malware

    What is phishing? How to recognize and protect yourself against phishing scams
    What is phishing? How to recognize and protect you...

    Cybercriminals use increasingly sophisticated methods to steal data and commit fraud. Yet,...

    What is Cyber security? Types of Threats, Importance and Benefits
    What is Cyber security? Types of Threats, Importan...

    Updated Jan 2024 Your home probably houses some vital possessions and heirlooms, so when you...

    9 10 11 12 13
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy