• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a Demo

    Blog – Latest Research, Trends, and Insights

    Understanding cyber risk as a “business risk” at senior management level
    Understanding cyber risk as a “business risk” at s...

    By Andrew Lintell The C-suite cares about cybersecurity now more than ever. Every day there’s...

    Detect, manage and respond: Clop ransomware
    Detect, manage and respond: Clop ransomware

    TL;DR There is a growing complexity of ransomware development and threat actors who are...

    Hunting and remediating BlackCat ransomware
    Hunting and remediating BlackCat ransomware

    By Anish Bogati and Bibek Thapa Magar; Security Research TL;DR Known by many names,...

    Cyber insurance paradigm shift: Protecting the business without the ‘hail mary’ remedy
    Cyber insurance paradigm shift: Protecting the bus...

    Ransomware attacks and their significant financial threat to organizations have contributed to...

    Text4Shell: Detecting exploitation of CVE-2022-42889
    Text4Shell: Detecting exploitation of CVE-2022-428...

    –Anish Bogati & Nilaa Maharjan; Security Research Index Remnant of Log4Shell? PoC of...

    Detect, prevent and respond: A deep dive on malicious DLLs
    Detect, prevent and respond: A deep dive on malici...

    by Nilaa Maharjan, Security Research Index Click the links and navigate to each section: ...

    Emerging Threat: Hunting LockBit Variations using Logpoint
    Emerging Threat: Hunting LockBit Variations using ...

    – Anish Bogati & Nilaa Maharjan; Logpoint Global Services & Security Research Executive...

    Critical Infrastructure: What is NIS2?
    Critical Infrastructure: What is NIS2?

    The EU is often looked too as a global cybersecurity leader. And NIS2, a new EU policy in...

    Critical Infrastructure: Cybersecurity and the energy sector
    Critical Infrastructure: Cybersecurity and the ene...

    Digitalization has brought huge benefits to energy sector businesses. Internet of Things...

    ProxyNotShell: Detecting exploitation of zero-day Exchange server vulnerabilities
    ProxyNotShell: Detecting exploitation of zero-day ...

    by Bhabesh Raj Rai, Security Research On September 29, 2022, Microsoft confirmed reports of...

    What is a Managed Security Service Provider (MSSP)?
    What is a Managed Security Service Provider (MSSP)...

    A Managed Security Service Provider (MSSP) facilitates managed security services for the end...

    5 investments that every MDR should make
    5 investments that every MDR should make

    Managed Detection and Response (MDR) services play a hugely valuable role for their clients. ...

    6 7 8 9 10
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy