• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    What is phishing? How to recognize and protect yourself against phishing scams
    What is phishing? How to recognize and protect you...

    Cybercriminals use increasingly sophisticated methods to steal data and commit fraud. Yet,...

    SolarWinds Orion Supply Chain Attack
    SolarWinds Orion Supply Chain Attack

    By Bhabesh Raj Rai, Associate Security Analytics Engineer On December 13, 2020, CISA...

    What is Cyber security? Types of Threats, Importance and Benefits
    What is Cyber security? Types of Threats, Importan...

    Updated Jan 2024 Your home probably houses some vital possessions and heirlooms, so when you...

    Active exploitation of the Oracle WebLogic Server RCE vulnerability (CVE-2020-14882)
    Active exploitation of the Oracle WebLogic Server ...

    By Bhabesh Raj Rai, Associate Security Analytics Engineer The October release of Oracle’s...

    Efficient control of access to patient data with Applied Analytics
    Efficient control of access to patient data with A...

    Updated July 2023 Finding the right balance between digitalization and data accessibility is ...

    Logpoint Guide: What is log management, and why is it so important?
    Logpoint Guide: What is log management, and why is...

    By Nils Krumrey, Global Customer Success Manager, Logpoint When customers speak to us, the...

    The complete guide to log analysis
    The complete guide to log analysis

    Modern businesses have become reliant on data analytics, especially within cybersecurity, IT...

    Microsoft Exchange Server RCE vulnerability (CVE-2020-0688)
    Microsoft Exchange Server RCE vulnerability (CVE-2...

    By Bhabesh Raj Rai, Associate Security Analytics Engineer, LogPoint On February 11, 2020, ...

    Threat hunting with Linux – Detecting a cryptomining attack
    Threat hunting with Linux – Detecting a cryptomini...

    By Bhabesh Raj Rai, Associate Security Analytics Engineer, LogPoint Cryptomining malware...

    Guide to the MITRE ATT&CK Framework: What is it and how can it benefit you?
    Guide to the MITRE ATT&CK Framework: What is it an...

    What is the MITRE ATT&CK Framework? Cybersecurity criminals around the world are constantly...

    Detecting the Zerologon vulnerability in LogPoint
    Detecting the Zerologon vulnerability in LogPoint

    By Bhabesh Raj Rai, Associate Security Analytics Engineer, LogPoint On August 11, 2020, ...

    Prometei botnet and its cryptomining shenanigans
    Prometei botnet and its cryptomining shenanigans

    By Bhabesh Raj Rai, Associate Security Analytics Engineer, LogPoint On Wednesday, July...

    9 10 11 12 13
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy