• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    ESXiArgs Ransomware: never too early to jump the gun
    ESXiArgs Ransomware: never too early to jump the g...

    VMware ESXi hypervisor allows organizations to host multiple virtual systems on a single...

    Russia V Ukraine: Round two – Gamma Edition
    Russia V Ukraine: Round two – Gamma Edition

    A year on since the first attack on Ukrainian territory and the unofficial beginning of the...

    Emerging Threat: The PLAY with OWASSRF
    Emerging Threat: The PLAY with OWASSRF

    Executive Summary: First appeared in June 2022, still active and victimizing high-profile...

    A BOLDMOVE by the Chinese Hackers: Exploiting Fortinet Systems
    A BOLDMOVE by the Chinese Hackers: Exploiting Fort...

    By Nilaa Maharjan, Security Research. Contents Key Findings Which Products and...

    Hive hunter: The tools and tactics to track down Hive ransomware
    Hive hunter: The tools and tactics to track down H...

    By Rabindra Dev Bhatta, Security Research Contents Fast Facts Technical analysis Hunting...

    A crowning achievement: Exploring the exploit of Royal ransomware
    A crowning achievement: Exploring the exploit of R...

    By Anish Bogati, Security Research Contents Fast Facts Royal analysis Analysis of an...

    Emerging Threats: Emotet-ually Unstable – The resurgence of a nuisance
    Emerging Threats: Emotet-ually Unstable – The resu...

    By Anish Bogati, Logpoint Global Services and Security Research Contents TL;DR What is...

    Hunting and remediating BlackCat ransomware
    Hunting and remediating BlackCat ransomware

    By Anish Bogati and Bibek Thapa Magar; Security Research TL;DR Known by many names,...

    Emerging Threat: IcedID Beacon – Hunting, Preventing, and Responding to IcedID Malware using Logpoint
    Emerging Threat: IcedID Beacon – Hunting, Preventi...

    By Nilaa Maharjan, Security Research Index Why is this threat noteworthy? ...

    Text4Shell: Detecting exploitation of CVE-2022-42889
    Text4Shell: Detecting exploitation of CVE-2022-428...

    –Anish Bogati & Nilaa Maharjan; Security Research Index Remnant of Log4Shell? PoC of...

    Emerging Threat: Hunting LockBit Variations using Logpoint
    Emerging Threat: Hunting LockBit Variations using ...

    – Anish Bogati & Nilaa Maharjan; Logpoint Global Services & Security Research Executive...

    ProxyNotShell: Detecting exploitation of zero-day Exchange server vulnerabilities
    ProxyNotShell: Detecting exploitation of zero-day ...

    by Bhabesh Raj Rai, Security Research On September 29, 2022, Microsoft confirmed reports of...

    2 3 4 5 6
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy