• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a Demo

    Blog – Latest Research, Trends, and Insights

    Logpoint’s Top Ten MITRE ATT&CK Techniques
    Logpoint’s Top Ten MITRE ATT&CK Techniques

    Executive Summary Starting in 2022, Logpoint Security Research Team has set out on a mission....

    CVE-2023-23397: Detecting exploitation of zero-day Exchange server vulnerabilities
    CVE-2023-23397: Detecting exploitation of zero-day...

    by Nilaa Maharjan and Anish Bogati, Security Research A serious vulnerability tagged ...

    OneNote Malicious Attachment as Initial Vector – Detect, Investigate, and Remediate using Logpoint
    OneNote Malicious Attachment as Initial Vector – D...

    Attackers are using OneNote files to infiltrate systems by embedding malicious payloads, with...

    ESXiArgs Ransomware: never too early to jump the gun
    ESXiArgs Ransomware: never too early to jump the g...

    VMware ESXi hypervisor allows organizations to host multiple virtual systems on a single...

    Introducing AgentX: Improve detection and remediation of threats in endpoints
    Introducing AgentX: Improve detection and remediat...

    By Sergio Lozano Álvarez, Product Marketing Manager Many mid-size organizations lack the...

    Hacker as a Service: What is HaaS?
    Hacker as a Service: What is HaaS?

    Cybersecurity has become a major concern for businesses and individuals alike. With the...

    Uncovering illegitimate Crypto-Mining Activity (Cryptojacking) in the Enterprise: Utilizing Network Logs for Investigation and Remediation
    Uncovering illegitimate Crypto-Mining Activity (Cr...

    By Swachchhanda Shrawan Poudel, Security Research Contents Crypto mining fast facts The...

    Critical Infrastructure: KRITIS – How does the German IT Security Act (BSI) impact cybersecurity?
    Critical Infrastructure: KRITIS – How does the Ger...

    by Sükrü ilkel Birakoglu, Senior Director The German IT Security Act 2.0 passed by the German...

    Embracing randomness to detect threats through entropy
    Embracing randomness to detect threats through ent...

    By Bhabesh Raj Rai, Security Research Contents What is Entropy? The calculation Use...

    Hive hunter: The tools and tactics to track down Hive ransomware
    Hive hunter: The tools and tactics to track down H...

    By Rabindra Dev Bhatta, Security Research Contents Fast Facts Technical analysis Hunting...

    A crowning achievement: Exploring the exploit of Royal ransomware
    A crowning achievement: Exploring the exploit of R...

    By Anish Bogati, Security Research Contents Fast Facts Royal analysis Analysis of an...

    A crowning achievement: Exploring the exploit of R...

    By Anish Bogati, Security Research Contents Fast Facts Royal analysis Analysis of an...

    5 6 7 8 9
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy