• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
        • Security Maturity Assessment
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
        • Security Maturity Assessment
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    Why cyber sovereignty matters in today’s threat landscape
    Why cyber sovereignty matters in today’s threat la...

    Discover how EU organizations can achieve NIS2 compliance and true digital sovereignty with CIS18...

    ToolShell: When SharePoint Becomes a Gateway to RCE
    ToolShell: When SharePoint Becomes a Gateway to RC...

    By Ujwal Thapa and Anish Bogati; Security Research Microsoft’s Security Response Center (MSRC)...

    Frontline Intel: Pinpointing GRU’s TTPs in the Recent Campaign
    Frontline Intel: Pinpointing GRU’s TTPs in the Rec...

    Joint Cybersecurity Advisory (CSA) AA25-141A exposes a sustained and multifaceted cyber-espionage...

    ClickFix: Another Deceptive Social Engineering Technique
    ClickFix: Another Deceptive Social Engineering Tec...

    Discover ClickFix, a rising social engineering threat used to deliver malware and learn how to...

    EDR Killers: After All, EDRs Are Not Invincible
    EDR Killers: After All, EDRs Are Not Invincible

    EDR Killers are a growing cybersecurity threat in 2025 - Read our report and find out how Logpoint...

    APT28: Inside Forest Blizzard’s New Arsenal
    APT28: Inside Forest Blizzard’s New Arsenal

    Explore Forest Blizzard’s (APT28) latest tactics and attacks on Polish institutions. Learn about...

    End of the year Report: The cybersecurity rollercoaster of 2023
    End of the year Report: The cybersecurity rollerco...

    Explore our comprehensive 2023 Year-End Cybersecurity Report covering the surge in global cyber...

    The ultimate SIEM pricing guide
    The ultimate SIEM pricing guide

    Struggling with SIEM pricing complexity? Explore our guide for insights into various models, hidden...

    The difference between SIEM and EDR (SIEM vs EDR)
    The difference between SIEM and EDR (SIEM vs EDR)

    SIEM and EDR have overlapping functionalities. Learn what the differences between the solutions...

    CVE-2023-38831: WinRAR – Decompression or Arbitrary Code Execution
    CVE-2023-38831: WinRAR – Decompression or Arbitrar...

    Discover more about vulnerability CVE-2023-38831. Do you use WinRAR for ZIP files? If so you could...

    NIS2 Fines: An overview of possible penalties for non-compliance.
    NIS2 Fines: An overview of possible penalties for ...

    Compliance with NIS2 is vital for organisations. Non compliance can result in heavy fines. Read...

    Threat Hunting: Collaboration. Harnessing the Power of Teamwork
    Threat Hunting: Collaboration. Harnessing the Powe...

    Explore the critical benefits of collaborative threat-hunting in cybersecurity. Foster...

    1 2 3 4 5
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy