• Logpoint BCS for SAP: Securing your SAP systems from cyber threats

    Protecting your SAP environment is critical to sustainable business success. So how can we prevent [...]

  • Emerging Threat: A Spool’s Gold: CVE-2022-21999 – Yet another Windows Print Spooler Privilege Escalation

    by Nilaa Maharjan Logpoint Global Services & Security ResearchWhat is SpoolFool (CVE-2022-21999)?SpoolFool, also known as [...]

  • Augment your Windows and EDR telemetry with Sysmon

    by Bhabesh Raj Rai, Security Research Sysmon (System Monitor) is one of the popular tools [...]

  • Emerging Threats: ChromeLoader: A rise in malvertisers

    Nilaa Maharjan, Logpoint Global Services & Security ResearchThis blog post provides an overview of the [...]

  • Detecting Atlassian confluence remote code execution vulnerability (CVE-2022-26134) in Logpoint

    by Bhabesh Raj Rai, Security ResearchOn June 2, 2022, Atlassian released a security advisory for [...]

  • Detecting Follina: Microsoft Office remote code execution zero-day

    by Bhabesh Raj Rai, Security ResearchOn May 27, 2022, a security researcher highlighted a malicious [...]

  • Detecting high severity AD privilege escalation vulnerability

    by Bhabesh Raj Rai, Security Research In this month’s patch Tuesday, Microsoft fixed a high [...]

  • Business-critical applications: What are they and how do you protect them from cyberattack?

    by Aida Grollov, Product Marketing Manager, LogpointDid you know that SAP customers generate 87% of [...]

  • Emerging Threats: Buzz of the Bumblebee – A new malicious loader

    Nilaa Maharjan, Logpoint Global Services & Security ResearchThis blog post provides an overview of the [...]

  • Hunting and remediating ngrok tunnels using Logpoint

    by Bhabesh Raj Rai, Security ResearchAmong developers, ngrok is a popular reverse proxy utility for [...]

  • Emerging Threats: SpringShell, not Spring4Shell – A Blooming Hype

    Nilaa Maharjan, Logpoint Global Services & Security ResearchThis blog post provides an overview of the [...]

  • Emerging Threats Protection: Defending against Russian cyber operations

    Cyber threats have been rising since Russia began its war on Ukraine on February 24. [...]