• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a Demo

    Blog – Latest Research, Trends, and Insights

    APT28: Inside Forest Blizzard’s New Arsenal
    APT28: Inside Forest Blizzard’s New Arsenal

    Fast Facts: The Cyber espionage group Forest Blizzard is attributed to the GRU (Russia’s...

    Kapeka: A new toolkit in Arsenal of SandStorm
    Kapeka: A new toolkit in Arsenal of SandStorm

    FAST FACTS Kapeka, also known as KnuckleTouch, originally appeared in mid-2022 but was...

    Logpoint’s latest release: Gain control over your security operations
    Logpoint’s latest release: Gain control over your ...

    Organizations depend on their security analyst to detect, investigate, and respond to any...

    Beginners guide to SAP Security: Why is it important and how does it work?
    Beginners guide to SAP Security: Why is it importa...

    Organizations widely use SAP systems to perform daily operations throughout almost every step...

    XZ Utils Backdoor: Supply Chain Vulnerability (CVE-2024-3094)
    XZ Utils Backdoor: Supply Chain Vulnerability (CVE...

    Introduction XZ Utils is a set of open-source compression utilities for compressing and...

    Raspberry Robin, Not a Juicy Raspberry You Love
    Raspberry Robin, Not a Juicy Raspberry You Love

    Fast facts Raspberry Robin, previously disseminated through USB drives, now employs Discord...

    Inside DarkGate: Exploring the infection chain and capabilities
    Inside DarkGate: Exploring the infection chain and...

    As the threat landscape continually evolves, some positive developments, such as authorities...

    A Comprehensive Overview on Stealer Malware Families
    A Comprehensive Overview on Stealer Malware Famili...

    Fast Facts Over the last seven years, there has been a noticeable increase in the sale and...

    Unveiling the ScreenConnect Authentication Bypass (CVE-2024-1709 & CVE-2024-1708)
    Unveiling the ScreenConnect Authentication Bypass ...

    On February 19, 2024, ConnectWise issued a critical advisory concerning two highly concerning...

    The importance of visibility for effective cloud security
    The importance of visibility for effective cloud s...

    The greater adoption of cloud technology has transformed how organizations operate, expand,...

    Pikabot: A Sophisticated and Modular Backdoor Trojan with Advanced Evasion Techniques
    Pikabot: A Sophisticated and Modular Backdoor Troj...

    Fast Facts Pikabot is a multi-staged backdoor trojan that emerged in early 2023. The most...

    End of the year Report: The cybersecurity rollercoaster of 2023
    End of the year Report: The cybersecurity rollerco...

    Global cyber onslaughts were witnessed in 2023 across industries, affecting many...

    2 3 4 5 6
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy