• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
        • Security Maturity Assessment
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
        • Security Maturity Assessment
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    Detecting malicious macros is a vital tool in the fight against malware
    Detecting malicious macros is a vital tool in the ...

    by Bhabesh Raj Rai, Security Research Even the most sophisticated and advanced state-sponsored...

    Detecting PwnKit local privilege escalation vulnerability
    Detecting PwnKit local privilege escalation vulner...

    by Bhabesh Raj Rai, Security Research Department On January 25, 2022, Qualys disclosed the details...

    Detecting, investigating and mitigating privilege escalation vulnerabilities to prevent full AD control
    Detecting, investigating and mitigating privilege ...

    Recent Active Directory (AD) privilege escalation vulnerabilities allow standard domain users to...

    Detecting Log4Shell requires more than just a SIEM
    Detecting Log4Shell requires more than just a SIEM

    The Log4Shell exploit is serious - it's difficult to detect, used in lots and lots of software and...

    The Remote Access Trojan (RAT), a Legacy Product at a Mass Market Price
    The Remote Access Trojan (RAT), a Legacy Product a...

    The Remote Access Trojan (RAT) can be considered a legacy tool for hackers. The RAT is a malware...

    Detecting Privilege Escalation Zero Day (CVE-2021-41379)
    Detecting Privilege Escalation Zero Day (CVE-2021-...

    On November 22, 2021, Security researcher Abdelhamid Naceri dropped PoC for a privilege escalation...

    Implementing a Syslog Proxy compliant with LogPoint
    Implementing a Syslog Proxy compliant with LogPoin...

    Though syslog protocol is very common, some customers are experiencing challenges to set it up...

    Add Netflow log ingestion to LogPoint
    Add Netflow log ingestion to LogPoint

    Netflow support is available in LogPoint, and requires the Netflow Application to be installed....

    Implementing SOAR Solutions: How Do You Select the Best SOAR Tools?
    Implementing SOAR Solutions: How Do You Select the...

    SOAR is becoming increasingly important in an evolving cybersecurity landscape. Find out how to...

    What is SOAR? A complete guide to Security Orchestration, Automation and Response
    What is SOAR? A complete guide to Security Orchest...

    SOAR—a Security Orchestration, Automation and Response system—may be what your cybersecurity...

    Detecting Conti ransomware – The successor of infamous Ryuk
    Detecting Conti ransomware – The successor of infa...

    Conti ransomware first observed in May 2020 is widely believed to be the successor to Wizard...

    Detecting exploitation of zero-day CVE-2021-40444 in Microsoft MSHTML
    Detecting exploitation of zero-day CVE-2021-40444 ...

    On September 7, 2021, Microsoft released an advisory on a zero-day (CVE-2021-40444) vulnerability...

    10 11 12 13 14
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy