• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a Demo

    Blog – Latest Research, Trends, and Insights

    New Reality: APTs Boost Sophisticated Cyber Attacks
    New Reality: APTs Boost Sophisticated Cyber Attack...

    With the report “Attack on Danish Critical Infrastructure,” the Danish SectorCERT delves into...

    Is a hybrid SOC model the way to expand your cybersecurity when you lack in-house resources?
    Is a hybrid SOC model the way to expand your cyber...

    Without a doubt, knowing when to outsource and when to do something yourself is one of those...

    Uncovering Rhysida and their activities
    Uncovering Rhysida and their activities

    Fast Facts about Rhysida Rhysida emerged as one of the most active ransomware groups in...

    TTPs of Russian SVR-affiliated Threat Actor Exploiting CVE-2023-42793
    TTPs of Russian SVR-affiliated Threat Actor Exploi...

    Recently, CISA, along with the National Cyber Security Centre (NCSC) of the United Kingdom,...

    Decoding the Threat: HTML Smuggling Detection Essentials
    Decoding the Threat: HTML Smuggling Detection Esse...

    Modern web applications perform most of their processing and rendering on the client side,...

    The ultimate SIEM pricing guide
    The ultimate SIEM pricing guide

    Choosing the right SIEM solution is a challenging task, especially when it comes to pricing...

    Emerging Threat: Cactus, a new player in the ransomware game – Is it the last?
    Emerging Threat: Cactus, a new player in the ranso...

    Fast Facts Cactus ransomware has been active since March 2023 and has been targeting...

    The difference between SIEM and EDR (SIEM vs EDR)
    The difference between SIEM and EDR (SIEM vs EDR)

    Sometimes different tools can have overlapping functionalities/capabilities, which may prove...

    Emerging Threat: APT-29 – The Not So Cozy Bear
    Emerging Threat: APT-29 – The Not So Cozy Bear

    The Dukes, or Cozy Bear, is a heavily financed, deeply dedicated, and efficiently coordinated...

    Use Case: An example of threat hunting with Converged SIEM
    Use Case: An example of threat hunting with Conver...

    Originally posted July 2019 – Updated October 2023 Threat hunting is gaining relevance by the...

    CVE-2023-38831: WinRAR – Decompression or Arbitrary Code Execution
    CVE-2023-38831: WinRAR – Decompression or Arbitrar...

    By Nischal Khadgi, Swachchhanda Shrawan Poudel, and Anish Bogati – (Security Research Team) ...

    NIS2 Fines: An overview of possible penalties for non-compliance.
    NIS2 Fines: An overview of possible penalties for ...

    NIS2 builds on the requirements of the original directive; it still aims to protect critical...

    3 4 5 6 7
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy