• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a Demo

    Blog – Latest Research, Trends, and Insights

    Hacker as a Service: What is HaaS?
    Hacker as a Service: What is HaaS?

    Cybersecurity has become a major concern for businesses and individuals alike. With the...

    Uncovering illegitimate Crypto-Mining Activity (Cryptojacking) in the Enterprise: Utilizing Network Logs for Investigation and Remediation
    Uncovering illegitimate Crypto-Mining Activity (Cr...

    By Swachchhanda Shrawan Poudel, Security Research Contents Crypto mining fast facts The...

    Critical Infrastructure: KRITIS – How does the German IT Security Act (BSI) impact cybersecurity?
    Critical Infrastructure: KRITIS – How does the Ger...

    by Sükrü ilkel Birakoglu, Senior Director The German IT Security Act 2.0 passed by the German...

    Embracing randomness to detect threats through entropy
    Embracing randomness to detect threats through ent...

    By Bhabesh Raj Rai, Security Research Contents What is Entropy? The calculation Use...

    Hive hunter: The tools and tactics to track down Hive ransomware
    Hive hunter: The tools and tactics to track down H...

    By Rabindra Dev Bhatta, Security Research Contents Fast Facts Technical analysis Hunting...

    A crowning achievement: Exploring the exploit of Royal ransomware
    A crowning achievement: Exploring the exploit of R...

    By Anish Bogati, Security Research Contents Fast Facts Royal analysis Analysis of an...

    A crowning achievement: Exploring the exploit of R...

    By Anish Bogati, Security Research Contents Fast Facts Royal analysis Analysis of an...

    Understanding cyber risk as a “business risk” at senior management level
    Understanding cyber risk as a “business risk” at s...

    By Andrew Lintell The C-suite cares about cybersecurity now more than ever. Every day there’s...

    Detect, manage and respond: Clop ransomware
    Detect, manage and respond: Clop ransomware

    TL;DR There is a growing complexity of ransomware development and threat actors who are...

    Hunting and remediating BlackCat ransomware
    Hunting and remediating BlackCat ransomware

    By Anish Bogati and Bibek Thapa Magar; Security Research TL;DR Known by many names,...

    Cyber insurance paradigm shift: Protecting the business without the ‘hail mary’ remedy
    Cyber insurance paradigm shift: Protecting the bus...

    Ransomware attacks and their significant financial threat to organizations have contributed to...

    Text4Shell: Detecting exploitation of CVE-2022-42889
    Text4Shell: Detecting exploitation of CVE-2022-428...

    –Anish Bogati & Nilaa Maharjan; Security Research Index Remnant of Log4Shell? PoC of...

    3 4 5 6 7
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy