• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a Demo

    Blog – Latest Research, Trends, and Insights

    Threat Hunting: Collaboration. Harnessing the Power of Teamwork
    Threat Hunting: Collaboration. Harnessing the Powe...

    In today’s ever-evolving cybersecurity landscape, organizations face a growing number of...

    Yet Another Microsoft Office365 zero-day: CVE-2023-36884
    Yet Another Microsoft Office365 zero-day: CVE-2023...

    Updated July 18, 2023 Fast Facts CVE-2023-36884 is an Office and Windows HTML Remote Code...

    Emerging Threat: BianLian Ransomware’s Shapeshift to Encryption-less Extortion
    Emerging Threat: BianLian Ransomware’s Shapeshift ...

    Executive Summary BianLian ransomware surfaced in June 2022 and has been a persistent threat...

    MOVEit’s Zero Day: The File Transfer Turmoil
    MOVEit’s Zero Day: The File Transfer Turmoil

    Executive Summary Multiple vulnerabilities in MOVEit Transfer tracked as CVE-2023-34362, ...

    What is SIEM? The Ultimate Guide to Security Information and Event Management
    What is SIEM? The Ultimate Guide to Security Infor...

    Data protection and cyber threat detection are crucial for businesses in today’s landscape....

    Emerging Threat: Vice Society’s Double Extortion Strategy
    Emerging Threat: Vice Society’s Double Extortion S...

    Executive Summary Vice Society is a relatively new Russian-speaking hacking group that arose...

    Introducing JSON Parser: Master your JSON data-types
    Introducing JSON Parser: Master your JSON data-typ...

    With the advent of cloud and container technologies, businesses and organizations are adopting...

    Detecting and Responding to Compromises in Azure AD through AAD Connect
    Detecting and Responding to Compromises in Azure A...

    Most organizations have infrastructures that span both on-premise and the cloud. To manage...

    PaperCut Vulnerability CVE-2023-27350: Detecting exploitation attempts
    PaperCut Vulnerability CVE-2023-27350: Detecting e...

    by Anish Bogati & Rabindra Dev Bhatta, Security Research – Updated May 8th 2023 PaperCut is...

    Phishing: Logpoint SOAR deep dive – Achieving a 77% reduction in time to resolution
    Phishing: Logpoint SOAR deep dive – Achieving a 77...

    Phishing is a cyber-attack where an adversary sends fraudulent emails, text messages, or other...

    When Zero Day Meets Ransomware: CVE-2023-28252 and Nokoyawa Ransomware
    When Zero Day Meets Ransomware: CVE-2023-28252 and...

    Microsoft has addressed a critical zero-day vulnerability actively exploited in the wild and...

    Detecting and Responding to Trojanized 3CX Desktop Applications
    Detecting and Responding to Trojanized 3CX Desktop...

    By Santosh Nepal and Anish Bogati; Security Research Updated on 21st April Quick Digest: When...

    4 5 6 7 8
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy