• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a Demo

    Blog – Latest Research, Trends, and Insights

    What is SIEM? The Ultimate Guide to Security Information and Event Management
    What is SIEM? The Ultimate Guide to Security Infor...

    Data protection and cyber threat detection are crucial for businesses in today’s landscape....

    Introducing JSON Parser: Master your JSON data-types
    Introducing JSON Parser: Master your JSON data-typ...

    With the advent of cloud and container technologies, businesses and organizations are adopting...

    Detecting and Responding to Compromises in Azure AD through AAD Connect
    Detecting and Responding to Compromises in Azure A...

    Most organizations have infrastructures that span both on-premise and the cloud. To manage...

    PaperCut Vulnerability CVE-2023-27350: Detecting exploitation attempts
    PaperCut Vulnerability CVE-2023-27350: Detecting e...

    by Anish Bogati & Rabindra Dev Bhatta, Security Research – Updated May 8th 2023 PaperCut is...

    Phishing: Logpoint SOAR deep dive – Achieving a 77% reduction in time to resolution
    Phishing: Logpoint SOAR deep dive – Achieving a 77...

    Phishing is a cyber-attack where an adversary sends fraudulent emails, text messages, or other...

    When Zero Day Meets Ransomware: CVE-2023-28252 and Nokoyawa Ransomware
    When Zero Day Meets Ransomware: CVE-2023-28252 and...

    Microsoft has addressed a critical zero-day vulnerability actively exploited in the wild and...

    Detecting and Responding to Trojanized 3CX Desktop Applications
    Detecting and Responding to Trojanized 3CX Desktop...

    By Santosh Nepal and Anish Bogati; Security Research Updated on 21st April Quick Digest: When...

    Logpoint’s Top Ten MITRE ATT&CK Techniques
    Logpoint’s Top Ten MITRE ATT&CK Techniques

    Executive Summary Starting in 2022, Logpoint Security Research Team has set out on a mission....

    CVE-2023-23397: Detecting exploitation of zero-day Exchange server vulnerabilities
    CVE-2023-23397: Detecting exploitation of zero-day...

    by Nilaa Maharjan and Anish Bogati, Security Research A serious vulnerability tagged ...

    OneNote Malicious Attachment as Initial Vector – Detect, Investigate, and Remediate using Logpoint
    OneNote Malicious Attachment as Initial Vector – D...

    Attackers are using OneNote files to infiltrate systems by embedding malicious payloads, with...

    ESXiArgs Ransomware: never too early to jump the gun
    ESXiArgs Ransomware: never too early to jump the g...

    VMware ESXi hypervisor allows organizations to host multiple virtual systems on a single...

    Introducing AgentX: Improve detection and remediation of threats in endpoints
    Introducing AgentX: Improve detection and remediat...

    By Sergio Lozano Álvarez, Product Marketing Manager Many mid-size organizations lack the...

    2 3 4 5 6
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy