Security Analysis - Most users assume files are safe. What if an application had been tampered...
Read: Check out our top 10 Mitre Att&ck techniques their uses and how often they used. Discover how...
Read and Download: AgentTesla is an Emerging Threat. Get insights and playbooks, plus detection and...
Detect and mitigate CVE-2023-23397 vulnerabilities. See how you can utilize Logpoint's Converged...
Discover how a malicious OneNote attachment was used as an initial vector for an attack and learn...
Improve the threat detection and remediation of threats at endpoints. AgentX is Logpoint's new...
Cybersecurity within organizations requires innovative thinking. Discover how this mindset fuels...
A year on since the first attack on Ukrainian territory and the unofficial beginning of the cyber...
Emerging Threats Report: Read the blog and download the report. Here we include information...
BOLDMOVE exploits Fortinet systems. Read more about this exploit and discover how you can best...
How crypto mining leads to Cryptojacking malware. What happens and how do they do it? Here we cover...