• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
        • Security Maturity Assessment
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
        • Security Maturity Assessment
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    Detecting the Zerologon vulnerability in LogPoint
    Detecting the Zerologon vulnerability in LogPoint

    Microsoft has released a security advisory for a critical privilege escalation flaw. Detect the...

    Prometei botnet and its cryptomining shenanigans
    Prometei botnet and its cryptomining shenanigans

    A cryptocurrency mining botnet attack, Prometei, has been quietly active since March. Learn how...

    What is a Security Operations Center (SOC)?
    What is a Security Operations Center (SOC)?

    A Security Operations Center is a command center for monitoring and protecting an organization from...

    Detecting Tor use with LogPoint
    Detecting Tor use with LogPoint

    CISA along with FBI released an advisory on Tor recommend that organizations assess their risk of...

    Detection of wormable RCE vulnerability in Windows DNS server
    Detection of wormable RCE vulnerability in Windows...

    Microsoft has released a total of 123 fixes. 18 are critical and impact Windows Server and Office...

    Explained SIEMply: Machine Learning
    Explained SIEMply: Machine Learning

    Machine learning is a branch within the artificial intelligence (AI) tree of technology. Learn more...

    Using LogPoint to detect ChainOfFools / CurveBall attack
    Using LogPoint to detect ChainOfFools / CurveBall ...

    ChainOfFools/CurveBall allows attackers to spoof certain cryptographic operations on Windows. See...

    LockerGoga ransomware
    LockerGoga ransomware

    LockerGoga ransomware strikes again! LogPoint’s LockerGoga malware application detects any malware...

    Abusing Exchange: One API call away from Domain Admin
    Abusing Exchange: One API call away from Domain Ad...

    Privilege escalation attacks targeting Microsoft Exchange is a serious risk. Get our...

    Detect RYUK ransomware with LogPoint
    Detect RYUK ransomware with LogPoint

    Learn how to detect RYUK Ransomware with LogPoint. Enter LogPoint's blog universe and stay...

    Fight off CMB Dharma ransomware with LogPoint
    Fight off CMB Dharma ransomware with LogPoint

    Learn how to fight off CMB Dharma Ransomware with LogPoint. Enter LogPoint's blog universe and stay...

    Prowli malware detection
    Prowli malware detection

    Learn how to detect Proxli Malware with LogPoint. Enter LogPoint's blog universe and stay...

    12 13 14 15 16
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy