• Augment your Windows and EDR telemetry with Sysmon

    by Bhabesh Raj Rai, Security Research Sysmon (System Monitor) is one of the popular tools [...]

  • Emerging Threats: ChromeLoader: A rise in malvertisers

    Nilaa Maharjan, Logpoint Global Services & Security ResearchThis blog post provides an overview of the [...]

  • Detecting Atlassian confluence remote code execution vulnerability (CVE-2022-26134) in Logpoint

    by Bhabesh Raj Rai, Security ResearchOn June 2, 2022, Atlassian released a security advisory for [...]

  • Detecting Follina: Microsoft Office remote code execution zero-day

    by Bhabesh Raj Rai, Security ResearchOn May 27, 2022, a security researcher highlighted a malicious [...]

  • Detecting high severity AD privilege escalation vulnerability

    by Bhabesh Raj Rai, Security Research In this month’s patch Tuesday, Microsoft fixed a high [...]

  • Business-critical applications: What are they and how do you protect them from cyberattack?

    by Aida Grollov, Product Marketing Manager, LogpointDid you know that SAP customers generate 87% of [...]

  • Emerging Threats: Buzz of the Bumblebee – A new malicious loader

    Nilaa Maharjan, Logpoint Global Services & Security ResearchThis blog post provides an overview of the [...]

  • Hunting and remediating ngrok tunnels using Logpoint

    by Bhabesh Raj Rai, Security ResearchAmong developers, ngrok is a popular reverse proxy utility for [...]

  • In-depth look at the NetWalker ransomware operators

    by Gustav Elkjær Rødsgaard, Junior Security AnalystIn 2019 Netwalker, a type of ransomware that is [...]

  • Detecting malicious macros is a vital tool in the fight against malware

    by Bhabesh Raj Rai, Security ResearchEven the most sophisticated and advanced state-sponsored attackers leave digital [...]

  • Emerging Threats: Cyberattacks on the rise in the wake of the Ukraine crisis: 5 ways to strengthen cybersecurity defenses

    By Ivan Vinogradov, Security analyst, Logpoint, and Jan Quach, Global Director of Customer Success Engineering, [...]

  • Detecting PwnKit local privilege escalation vulnerability

    by Bhabesh Raj Rai, Security Research DepartmentOn January 25, 2022, Qualys disclosed the details of a memory [...]