• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    Uncoiling the Enigma of Russian Intelligence’s “Snake Malware”
    Uncoiling the Enigma of Russian Intelligence’s “Sn...

    You could be forgiven for thinking it’s the month of snake, as the Russian Intelligence’s...

    Emerging Threat: Vice Society’s Double Extortion Strategy
    Emerging Threat: Vice Society’s Double Extortion S...

    Executive Summary Vice Society is a relatively new Russian-speaking hacking group that arose...

    Introducing JSON Parser: Master your JSON data-types
    Introducing JSON Parser: Master your JSON data-typ...

    With the advent of cloud and container technologies, businesses and organizations are adopting...

    Detecting and Responding to Compromises in Azure AD through AAD Connect
    Detecting and Responding to Compromises in Azure A...

    Most organizations have infrastructures that span both on-premise and the cloud. To manage...

    PaperCut Vulnerability CVE-2023-27350: Detecting exploitation attempts
    PaperCut Vulnerability CVE-2023-27350: Detecting e...

    by Anish Bogati & Rabindra Dev Bhatta, Security Research – Updated May 8th 2023 PaperCut is...

    Phishing: Logpoint SOAR deep dive – Achieving a 77% reduction in time to resolution
    Phishing: Logpoint SOAR deep dive – Achieving a 77...

    Phishing is a cyber-attack where an adversary sends fraudulent emails, text messages, or other...

    A comprehensive guide to detecting Ransomware-as-a-Service using Logpoint
    A comprehensive guide to detecting Ransomware-as-a...

    By Nilaa Maharjan and Anish Bogati, Security Research Foreword: Ransomware is a type of...

    When Zero Day Meets Ransomware: CVE-2023-28252 and Nokoyawa Ransomware
    When Zero Day Meets Ransomware: CVE-2023-28252 and...

    Microsoft has addressed a critical zero-day vulnerability actively exploited in the wild and...

    Detecting and Responding to Trojanized 3CX Desktop Applications
    Detecting and Responding to Trojanized 3CX Desktop...

    By Santosh Nepal and Anish Bogati; Security Research Updated on 21st April Quick Digest: When...

    Logpoint’s Top Ten MITRE ATT&CK Techniques
    Logpoint’s Top Ten MITRE ATT&CK Techniques

    Executive Summary Starting in 2022, Logpoint Security Research Team has set out on a mission....

    Emerging Threat: AgentTesla – A Review and Detection Strategies
    Emerging Threat: AgentTesla – A Review and Detecti...

    AgentTesla [S0331] a.k.a Negasteal is a .NET-based Remote Administrator Tool (RAT) first...

    CVE-2023-23397: Detecting exploitation of zero-day Exchange server vulnerabilities
    CVE-2023-23397: Detecting exploitation of zero-day...

    by Nilaa Maharjan and Anish Bogati, Security Research A serious vulnerability tagged ...

    5 6 7 8 9
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy