Find out about the zero-day exploit CVE-2023-28252 and how it can be exploited by Nokoyawa...
Security Analysis - Most users assume files are safe. What if an application had been tampered...
Read: Check out our top 10 Mitre Att&ck techniques their uses and how often they used. Discover how...
Read and Download: AgentTesla is an Emerging Threat. Get insights and playbooks, plus detection and...
Detect and mitigate CVE-2023-23397 vulnerabilities. See how you can utilize Logpoint's Converged...
Discover how a malicious OneNote attachment was used as an initial vector for an attack and learn...
Improve the threat detection and remediation of threats at endpoints. AgentX is Logpoint's new...
Cybersecurity within organizations requires innovative thinking. Discover how this mindset fuels...
A year on since the first attack on Ukrainian territory and the unofficial beginning of the cyber...
Emerging Threats Report: Read the blog and download the report. Here we include information...
BOLDMOVE exploits Fortinet systems. Read more about this exploit and discover how you can best...