• Crypto mining: Understanding and Protecting Against Cryptojacking

    We take it by now you have heard of crypto currency, so we won’t insult [...]

  • Ransomware-as-a-Service (RaaS) – A Growing Threat in Cybersecurity

    In the world of cybersecurity, ransomware-as-a-service (RaaS) has become a growing concern for businesses and [...]

  • Critical Infrastructure: KRITIS and SAP systems

    by Sükrü ilkel Birakoglu, Senior Director With the introduction of the IT Security Act 2.0, the [...]

  • Critical Infrastructure: KRITIS – How does the German IT Security Act (BSI) impact cybersecurity?

    by Sükrü ilkel Birakoglu, Senior Director The German IT Security Act 2.0 passed by the German [...]

  • Critical Infrastructure: Five biggest threats to banks

    When it comes to complex and demanding cybersecurity jobs, being a CISO or analyst in [...]

  • How can MSSPs leverage knowledge for multiple customers? Tips & Tricks for MSSPs

    By: Gitte Gade, Product Marketing ManagerA 2022 study showed that the number one problem MSSP [...]

  • Embracing randomness to detect threats through entropy

    By Bhabesh Raj Rai, Security ResearchContentsWhat is Entropy?The calculationUse cases using the entropy methodLayer your [...]

  • Hive hunter: The tools and tactics to track down Hive ransomware

    By Rabindra Dev Bhatta, Security ResearchContentsFast FactsTechnical analysisHunting Hive with LogpointInvestigation and response with LogpointRemediation [...]

  • Critical Infrastructure: Cybersecurity And The World Economy

    You may have noticed that, over the last two years, it seems that cyberattacks are [...]

  • Critical Infrastructure: Emails – Why are they such a target?

    Emails house a treasure trove of data, but what kind of data do they contain? [...]

  • A crowning achievement: Exploring the exploit of Royal ransomware

    By Anish Bogati, Security ResearchContentsFast FactsRoyal analysisAnalysis of an older version of RoyalDetecting Royal using [...]

  • A crowning achievement: Exploring the exploit of Royal ransomware

    By Anish Bogati, Security ResearchContentsFast FactsRoyal analysisAnalysis of an older version of RoyalDetecting Royal using [...]