• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    EDR Killers: After All, EDRs Are Not Invincible
    EDR Killers: After All, EDRs Are Not Invincible

    Fast Facts: EDR Killers are a growing cybersecurity threat, gaining prominence in 2024 and...

    Exploring Strela Stealer: Initial Payload Analysis and Insights
    Exploring Strela Stealer: Initial Payload Analysis...

    In cybersecurity research, it’s easy to get caught up in the pursuit of uncovering new...

    Hiding in Plain Sight: The Subtle Art of Loki Malware’s Obfuscation
    Hiding in Plain Sight: The Subtle Art of Loki Malw...

    With the surge of cyberattacks, sharing threat intelligence in the form of insights, trends,...

    Latrodectus: The Wrath of Black Widow
    Latrodectus: The Wrath of Black Widow

    Latrodectus, also known as BlackWidow, was developed by the same creators of IcedID malware,...

    How to use Logpoint pySigma Backend for threat detection
    How to use Logpoint pySigma Backend for threat det...

    There’s no doubt that open-source projects are immense contributors to the software...

    Shenanigans of Scheduled Tasks
    Shenanigans of Scheduled Tasks

    Updated August 26, 2024 Scheduled Tasks are the automated processes configured to run...

    Threat Detection and Monitoring with Microsoft 365
    Threat Detection and Monitoring with Microsoft 365

    There’s no doubt that Microsoft 365 is widely used among companies of all sorts of sizes. This...

    Defending Against OS Credential Dumping: Threat Landscape, Strategies, and Best Practices
    Defending Against OS Credential Dumping: Threat La...

    Fast Facts OS Credential Dumping (T1003) is a critical cybersecurity threat. It involves...

    APT28: Inside Forest Blizzard’s New Arsenal
    APT28: Inside Forest Blizzard’s New Arsenal

    Fast Facts: The Cyber espionage group Forest Blizzard is attributed to the GRU (Russia’s...

    Kapeka: A new toolkit in Arsenal of SandStorm
    Kapeka: A new toolkit in Arsenal of SandStorm

    FAST FACTS Kapeka, also known as KnuckleTouch, originally appeared in mid-2022 but was...

    Dynamic Link Dazzle: Unveiling the Dark Side of DLLs
    Dynamic Link Dazzle: Unveiling the Dark Side of DL...

    Fast facts: DLL side-loading is a technique for executing malicious payloads inside a...

    XZ Utils Backdoor: Supply Chain Vulnerability (CVE-2024-3094)
    XZ Utils Backdoor: Supply Chain Vulnerability (CVE...

    Introduction XZ Utils is a set of open-source compression utilities for compressing and...

    1 2 3 4 5
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy