• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    What is a Security Operations Center (SOC)?
    What is a Security Operations Center (SOC)?

    Updated August 2024 A Security Operations Center (SOC) is a centralized command unit within an...

    Detecting Tor use with LogPoint
    Detecting Tor use with LogPoint

    By Bhabesh Raj Rai, Associate Security Analytics Engineer, LogPoint On July 1, 2020, the...

    Detection of wormable RCE vulnerability in Windows DNS server
    Detection of wormable RCE vulnerability in Windows...

    by Bhabesh Raj Rai, Associate Security Analytics Engineer, LogPoint For July’s Patch...

    Explained SIEMply: Machine Learning
    Explained SIEMply: Machine Learning

    By Guy Grieve, LogPoint Presales Manager, EMEA A key difference between the computer and...

    Using LogPoint to detect ChainOfFools / CurveBall attack
    Using LogPoint to detect ChainOfFools / CurveBall ...

    By Kushal Gajurel, Associate Security Analytics Engineer, LogPoint On the first Patch...

    LockerGoga ransomware
    LockerGoga ransomware

    By Roshan Pokhrel, Associate Engineering Manager, LogPoint After rearing its ugly head in...

    Abusing Exchange: One API call away from Domain Admin
    Abusing Exchange: One API call away from Domain Ad...

    By Sandeep Sigdel, Lead Architect Security Analytics, LogPoint In organizations using AD and...

    Detect RYUK ransomware with LogPoint
    Detect RYUK ransomware with LogPoint

    RYUK, a highly targeted ransomware campaign has been rearing its head over the past weeks. The...

    Fight off CMB Dharma ransomware with LogPoint
    Fight off CMB Dharma ransomware with LogPoint

    A new variant of the Dharma ransomware has been discovered, where a .cmb extension is appended...

    Prowli malware detection
    Prowli malware detection

    Operation Prowli, a traffic manipulation and crypto currency mining malware has infected many...

    Hidden Cobra
    Hidden Cobra

    Hidden Cobra is an APT hacking group mostly targeting against media organizations, aerospace,...

    Bad Rabbit ransomware
    Bad Rabbit ransomware

    Ransomware is without doubt one of the most rising threats nowadays, and the latest outbreak...

    9 10 11 12 13
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy