• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    Embracing randomness to detect threats through entropy
    Embracing randomness to detect threats through ent...

    By Bhabesh Raj Rai, Security Research Contents What is Entropy? The calculation Use...

    Hive hunter: The tools and tactics to track down Hive ransomware
    Hive hunter: The tools and tactics to track down H...

    By Rabindra Dev Bhatta, Security Research Contents Fast Facts Technical analysis Hunting...

    A crowning achievement: Exploring the exploit of Royal ransomware
    A crowning achievement: Exploring the exploit of R...

    By Anish Bogati, Security Research Contents Fast Facts Royal analysis Analysis of an...

    A crowning achievement: Exploring the exploit of R...

    By Anish Bogati, Security Research Contents Fast Facts Royal analysis Analysis of an...

    Logpoint 2023 predictions: The year of the business-driven CISO
    Logpoint 2023 predictions: The year of the busines...

    By Christian Have As 2023 closes in it’s time to make our predictions for the cybersecurity...

    Emerging Threats: Emotet-ually Unstable – The resurgence of a nuisance
    Emerging Threats: Emotet-ually Unstable – The resu...

    By Anish Bogati, Logpoint Global Services and Security Research Contents TL;DR What is...

    Understanding cyber risk as a “business risk” at senior management level
    Understanding cyber risk as a “business risk” at s...

    By Andrew Lintell The C-suite cares about cybersecurity now more than ever. Every day there’s...

    Detect, manage and respond: Clop ransomware
    Detect, manage and respond: Clop ransomware

    TL;DR There is a growing complexity of ransomware development and threat actors who are...

    Hunting and remediating BlackCat ransomware
    Hunting and remediating BlackCat ransomware

    By Anish Bogati and Bibek Thapa Magar; Security Research TL;DR Known by many names,...

    Cyber insurance paradigm shift: Protecting the business without the ‘hail mary’ remedy
    Cyber insurance paradigm shift: Protecting the bus...

    Ransomware attacks and their significant financial threat to organizations have contributed to...

    Emerging Threat: IcedID Beacon – Hunting, Preventing, and Responding to IcedID Malware using Logpoint
    Emerging Threat: IcedID Beacon – Hunting, Preventi...

    By Nilaa Maharjan, Security Research Index Why is this threat noteworthy? ...

    Text4Shell: Detecting exploitation of CVE-2022-42889
    Text4Shell: Detecting exploitation of CVE-2022-428...

    –Anish Bogati & Nilaa Maharjan; Security Research Index Remnant of Log4Shell? PoC of...

    4 5 6 7 8
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy