
Logpoint 2025 predictions: Cybersecurity in transformation
The year 2025 is upon us, and it’s time to reflect on what’s in store for the cybersecurity industry. [...]

EDR Killers: After All, EDRs Are Not Invincible
Fast Facts: EDR Killers are a growing cybersecurity threat, gaining prominence in 2024 and 2025. Widely deployed by ransomware groups, [...]

Director’s latest release: Take Total Control of Your MSSP Business
As Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) continue to play a critical role in safeguarding organizations, [...]

Exploring Strela Stealer: Initial Payload Analysis and Insights
In cybersecurity research, it's easy to get caught up in the pursuit of uncovering new threats. However, sometimes, the most [...]

Hiding in Plain Sight: The Subtle Art of Loki Malware’s Obfuscation
With the surge of cyberattacks, sharing threat intelligence in the form of insights, trends, and samples is crucial to combat [...]

Uncover more resources with Logpoint’s latest release
The cybersecurity industry is grappling with a massive shortage of skilled professionals while rising cyber threats and new regulatory frameworks [...]

Latrodectus: The Wrath of Black Widow
Latrodectus, also known as BlackWidow, was developed by the same creators of IcedID malware, notoriously recognized as the LUNAR SPIDER. [...]

Logpoint and Muninn: Better Together
Adding AI-driven Network Detection & Response (NDR) capabilities to Logpoint’s Security Information and Event Management (SIEM)-based Cyber Defense Platform.We’re thrilled [...]

How to use Logpoint pySigma Backend for threat detection
There’s no doubt that open-source projects are immense contributors to the software ecosystem. With an extensive and active community of [...]

Shenanigans of Scheduled Tasks
Updated August 26, 2024Scheduled Tasks are the automated processes configured to run automatically at a specified time or when certain [...]

Threat Detection and Monitoring with Microsoft 365
There’s no doubt that Microsoft 365 is widely used among companies of all sorts of sizes. This powerful suite of [...]

The Story of regreSSHion: A Resurfaced sshd Vulnerability
In cybersecurity, vulnerabilities are like ghosts from the past, appearing unexpectedly and haunting us. Such is the situation with regreSSHion [...]