• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a Demo

    Blog – Latest Research, Trends, and Insights

    Pikabot: A Sophisticated and Modular Backdoor Trojan with Advanced Evasion Techniques
    Pikabot: A Sophisticated and Modular Backdoor Troj...

    Fast Facts Pikabot is a multi-staged backdoor trojan that emerged in early 2023. The most...

    Uncovering Rhysida and their activities
    Uncovering Rhysida and their activities

    Fast Facts about Rhysida Rhysida emerged as one of the most active ransomware groups in...

    TTPs of Russian SVR-affiliated Threat Actor Exploiting CVE-2023-42793
    TTPs of Russian SVR-affiliated Threat Actor Exploi...

    Recently, CISA, along with the National Cyber Security Centre (NCSC) of the United Kingdom,...

    Emerging Threat: Cactus, a new player in the ransomware game – Is it the last?
    Emerging Threat: Cactus, a new player in the ranso...

    Fast Facts Cactus ransomware has been active since March 2023 and has been targeting...

    Emerging Threat: APT-29 – The Not So Cozy Bear
    Emerging Threat: APT-29 – The Not So Cozy Bear

    The Dukes, or Cozy Bear, is a heavily financed, deeply dedicated, and efficiently coordinated...

    CVE-2023-38831: WinRAR – Decompression or Arbitrary Code Execution
    CVE-2023-38831: WinRAR – Decompression or Arbitrar...

    By Nischal Khadgi, Swachchhanda Shrawan Poudel, and Anish Bogati – (Security Research Team) ...

    Yet Another Microsoft Office365 zero-day: CVE-2023-36884
    Yet Another Microsoft Office365 zero-day: CVE-2023...

    Updated July 18, 2023 Fast Facts CVE-2023-36884 is an Office and Windows HTML Remote Code...

    Emerging Threat: BianLian Ransomware’s Shapeshift to Encryption-less Extortion
    Emerging Threat: BianLian Ransomware’s Shapeshift ...

    Executive Summary BianLian ransomware surfaced in June 2022 and has been a persistent threat...

    MOVEit’s Zero Day: The File Transfer Turmoil
    MOVEit’s Zero Day: The File Transfer Turmoil

    Executive Summary Multiple vulnerabilities in MOVEit Transfer tracked as CVE-2023-34362, ...

    Emerging Threat: Vice Society’s Double Extortion Strategy
    Emerging Threat: Vice Society’s Double Extortion S...

    Executive Summary Vice Society is a relatively new Russian-speaking hacking group that arose...

    Detecting and Responding to Compromises in Azure AD through AAD Connect
    Detecting and Responding to Compromises in Azure A...

    Most organizations have infrastructures that span both on-premise and the cloud. To manage...

    PaperCut Vulnerability CVE-2023-27350: Detecting exploitation attempts
    PaperCut Vulnerability CVE-2023-27350: Detecting e...

    by Anish Bogati & Rabindra Dev Bhatta, Security Research – Updated May 8th 2023 PaperCut is...

    1 2 3 4 5
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy