• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    Emerging Threat: AgentTesla – A Review and Detection Strategies
    Emerging Threat: AgentTesla – A Review and Detecti...

    AgentTesla [S0331] a.k.a Negasteal is a .NET-based Remote Administrator Tool (RAT) first...

    CVE-2023-23397: Detecting exploitation of zero-day Exchange server vulnerabilities
    CVE-2023-23397: Detecting exploitation of zero-day...

    by Nilaa Maharjan and Anish Bogati, Security Research A serious vulnerability tagged ...

    OneNote Malicious Attachment as Initial Vector – Detect, Investigate, and Remediate using Logpoint
    OneNote Malicious Attachment as Initial Vector – D...

    Attackers are using OneNote files to infiltrate systems by embedding malicious payloads, with...

    ESXiArgs Ransomware: never too early to jump the gun
    ESXiArgs Ransomware: never too early to jump the g...

    VMware ESXi hypervisor allows organizations to host multiple virtual systems on a single...

    Introducing AgentX: Improve detection and remediation of threats in endpoints
    Introducing AgentX: Improve detection and remediat...

    By Sergio Lozano Álvarez, Product Marketing Manager Many mid-size organizations lack the...

    Hacker as a Service: What is HaaS?
    Hacker as a Service: What is HaaS?

    Cybersecurity has become a major concern for businesses and individuals alike. With the...

    Russia V Ukraine: Round two – Gamma Edition
    Russia V Ukraine: Round two – Gamma Edition

    A year on since the first attack on Ukrainian territory and the unofficial beginning of the...

    Emerging Threat: The PLAY with OWASSRF
    Emerging Threat: The PLAY with OWASSRF

    Executive Summary: First appeared in June 2022, still active and victimizing high-profile...

    A BOLDMOVE by the Chinese Hackers: Exploiting Fortinet Systems
    A BOLDMOVE by the Chinese Hackers: Exploiting Fort...

    By Nilaa Maharjan, Security Research. Contents Key Findings Which Products and...

    Uncovering illegitimate Crypto-Mining Activity (Cryptojacking) in the Enterprise: Utilizing Network Logs for Investigation and Remediation
    Uncovering illegitimate Crypto-Mining Activity (Cr...

    By Swachchhanda Shrawan Poudel, Security Research Contents Crypto mining fast facts The...

    Crypto mining: Understanding and Protecting Against Cryptojacking
    Crypto mining: Understanding and Protecting Agains...

    We take it by now you have heard of crypto currency, so we won’t insult you by explain too...

    Critical Infrastructure: KRITIS – How does the German IT Security Act (BSI) impact cybersecurity?
    Critical Infrastructure: KRITIS – How does the Ger...

    by Sükrü ilkel Birakoglu, Senior Director The German IT Security Act 2.0 passed by the German...

    3 4 5 6 7
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy