• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    Yet Another Microsoft Office365 zero-day: CVE-2023-36884
    Yet Another Microsoft Office365 zero-day: CVE-2023...

    Updated July 18, 2023 Fast Facts CVE-2023-36884 is an Office and Windows HTML Remote Code...

    MOVEit’s Zero Day: The File Transfer Turmoil
    MOVEit’s Zero Day: The File Transfer Turmoil

    Executive Summary Multiple vulnerabilities in MOVEit Transfer tracked as CVE-2023-34362, ...

    What is SIEM? The Ultimate Guide to Security Information and Event Management
    What is SIEM? The Ultimate Guide to Security Infor...

    Data protection and cyber threat detection are crucial for businesses in today’s landscape....

    Uncoiling the Enigma of Russian Intelligence’s “Snake Malware”
    Uncoiling the Enigma of Russian Intelligence’s “Sn...

    You could be forgiven for thinking it’s the month of snake, as the Russian Intelligence’s...

    Introducing JSON Parser: Master your JSON data-types
    Introducing JSON Parser: Master your JSON data-typ...

    With the advent of cloud and container technologies, businesses and organizations are adopting...

    Detecting and Responding to Compromises in Azure AD through AAD Connect
    Detecting and Responding to Compromises in Azure A...

    Most organizations have infrastructures that span both on-premise and the cloud. To manage...

    PaperCut Vulnerability CVE-2023-27350: Detecting exploitation attempts
    PaperCut Vulnerability CVE-2023-27350: Detecting e...

    by Anish Bogati & Rabindra Dev Bhatta, Security Research – Updated May 8th 2023 PaperCut is...

    Phishing: Logpoint SOAR deep dive – Achieving a 77% reduction in time to resolution
    Phishing: Logpoint SOAR deep dive – Achieving a 77...

    Phishing is a cyber-attack where an adversary sends fraudulent emails, text messages, or other...

    A comprehensive guide to detecting Ransomware-as-a-Service using Logpoint
    A comprehensive guide to detecting Ransomware-as-a...

    By Nilaa Maharjan and Anish Bogati, Security Research Foreword: Ransomware is a type of...

    When Zero Day Meets Ransomware: CVE-2023-28252 and Nokoyawa Ransomware
    When Zero Day Meets Ransomware: CVE-2023-28252 and...

    Microsoft has addressed a critical zero-day vulnerability actively exploited in the wild and...

    Detecting and Responding to Trojanized 3CX Desktop Applications
    Detecting and Responding to Trojanized 3CX Desktop...

    By Santosh Nepal and Anish Bogati; Security Research Updated on 21st April Quick Digest: When...

    Logpoint’s Top Ten MITRE ATT&CK Techniques
    Logpoint’s Top Ten MITRE ATT&CK Techniques

    Executive Summary Starting in 2022, Logpoint Security Research Team has set out on a mission....

    2 3 4 5 6
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy