• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a Demo

    Blog – Latest Research, Trends, and Insights

    Citrix Vulnerabilities Rising – When Gateways Give Way
    Citrix Vulnerabilities Rising – When Gateways Give...

    Citrix has issued an urgent warning about multiple vulnerabilities in NetScaler ADC and...

    APT28’s New Arsenal: LAMEHUG, the First AI-Powered Malware
    APT28’s New Arsenal: LAMEHUG, the First AI-Powered...

    Over the past few years, we’ve all been aware of the devastating war that has unfolded between...

    ToolShell: When SharePoint Becomes a Gateway to RCE
    ToolShell: When SharePoint Becomes a Gateway to RC...

    By Ujwal Thapa and Anish Bogati; Security Research Microsoft’s Security Response Center (MSRC)...

    The Impacket Arsenal: A Deep Dive into Impacket Remote Code Execution Tools
    The Impacket Arsenal: A Deep Dive into Impacket Re...

    In today’s evolving threat landscape, we continually see new threat actors emerge and novel...

    Frontline Intel: Pinpointing GRU’s TTPs in the Recent Campaign
    Frontline Intel: Pinpointing GRU’s TTPs in the Rec...

    Joint Cybersecurity Advisory (CSA) AA25-141Aexposes a sustained and multifaceted...

    Tricked by trust: How OAuth and device code flows get abused
    Tricked by trust: How OAuth and device code flows ...

    In today’s cloud-first environments, access tokens have become the new keys to the kingdom....

    Kubernetes Threat Hunting using API Server Audit Logs
    Kubernetes Threat Hunting using API Server Audit L...

    Kubernetes has emerged as the preferred platform for deploying and managing containerized...

    From Exploit to Ransomware: Detecting CVE-2025-29824
    From Exploit to Ransomware: Detecting CVE-2025-298...

    The Microsoft Security blog highlights the active exploitation of CVE-2025-24983, a zero-day...

    ClickFix: Another Deceptive Social Engineering Technique
    ClickFix: Another Deceptive Social Engineering Tec...

    Fast Facts ClickFix, first observed in mid-2024, represents a sophisticated form of social...

    Windows Shell Link Vulnerability ZDI-CAN-25373: Detecting Hidden Commands
    Windows Shell Link Vulnerability ZDI-CAN-25373: De...

    One of the latest vulnerabilities disclosed by TrendMicro, ZDI-CAN-25373, exposes a flaw in...

    EDR Killers: After All, EDRs Are Not Invincible
    EDR Killers: After All, EDRs Are Not Invincible

    Fast Facts: EDR Killers are a growing cybersecurity threat, gaining prominence in 2024 and...

    Exploring Strela Stealer: Initial Payload Analysis and Insights
    Exploring Strela Stealer: Initial Payload Analysis...

    In cybersecurity research, it’s easy to get caught up in the pursuit of uncovering new...

    1 2 3 4 5
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy