• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
        • Security Maturity Assessment
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
        • Security Maturity Assessment
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    Crypto mining: Understanding and Protecting Against Cryptojacking
    Crypto mining: Understanding and Protecting Agains...

    Mining for crypto is a legitimate process. But hackers know you are doing it and they want access...

    Critical Infrastructure: KRITIS – How does the German IT Security Act (BSI) impact cybersecurity?
    Critical Infrastructure: KRITIS – How does the Ger...

    by Sükrü ilkel Birakoglu, Senior Director The German IT Security Act 2.0 passed by the German...

    Embracing randomness to detect threats through entropy
    Embracing randomness to detect threats through ent...

    By Bhabesh Raj Rai, Security Research Contents What is Entropy? The calculation Use cases using the...

    Hive hunter: The tools and tactics to track down Hive ransomware
    Hive hunter: The tools and tactics to track down H...

    By Rabindra Dev Bhatta, Security Research Contents Fast Facts Technical analysis Hunting Hive with...

    A crowning achievement: Exploring the exploit of Royal ransomware
    A crowning achievement: Exploring the exploit of R...

    Be prepared to cyber threats in your procurement by taking care of supplier diversity

    A crowning achievement: Exploring the exploit of R...

    By Anish Bogati, Security Research Contents Fast Facts Royal analysis Analysis of an older version...

    Logpoint 2023 predictions: The year of the business-driven CISO
    Logpoint 2023 predictions: The year of the busines...

    Here we take a look into what the cybersecurity landscape will look like in 2023. We explore how...

    Emerging Threats: Emotet-ually Unstable – The resurgence of a nuisance
    Emerging Threats: Emotet-ually Unstable – The resu...

    This article describes the recent resurgence of Emotet malware after its initial shutdown in 2014....

    Understanding cyber risk as a “business risk” at senior management level
    Understanding cyber risk as a “business risk” at s...

    Go To Section Share This Story By Andrew Lintell The C-suite cares about cybersecurity now more...

    Detect, manage and respond: Clop ransomware
    Detect, manage and respond: Clop ransomware

    TL;DR There is a growing complexity of ransomware development and threat actors who are...

    Hunting and remediating BlackCat ransomware
    Hunting and remediating BlackCat ransomware

    Read our Security Analytics blog. Protect your organization from the devastating effects of...

    Cyber insurance paradigm shift: Protecting the business without the ‘hail mary’ remedy
    Cyber insurance paradigm shift: Protecting the bus...

    Ransomware attacks and their significant financial threat to organizations have contributed to a...

    7 8 9 10 11
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy