• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    Latrodectus: The Wrath of Black Widow
    Latrodectus: The Wrath of Black Widow

    Latrodectus, also known as BlackWidow, was developed by the same creators of IcedID malware,...

    How to use Logpoint pySigma Backend for threat detection
    How to use Logpoint pySigma Backend for threat det...

    There’s no doubt that open-source projects are immense contributors to the software ecosystem. With...

    Shenanigans of Scheduled Tasks
    Shenanigans of Scheduled Tasks

    Updated August 26, 2024 Scheduled Tasks are the automated processes configured to run automatically...

    The Story of regreSSHion: A Resurfaced sshd Vulnerability
    The Story of regreSSHion: A Resurfaced sshd Vulner...

    Discover the regreSSHion (CVE-2024-6387) OpenSSH vulnerability. Learn about its impact, affected...

    Defending Against OS Credential Dumping: Threat Landscape, Strategies, and Best Practices
    Defending Against OS Credential Dumping: Threat La...

    Discover the threat of OS Credential Dumping (T1003), its impact, and Logpoint’s strategies to...

    Kapeka: A new toolkit in Arsenal of SandStorm
    Kapeka: A new toolkit in Arsenal of SandStorm

    Kapeka backdoor targets Eastern Europe. Learn about Kapeka's functionalities, Sandstorm connection,...

    Dynamic Link Dazzle: Unveiling the Dark Side of DLLs
    Dynamic Link Dazzle: Unveiling the Dark Side of DL...

    DLL Flaw Injects Malware! Hackers target KeyScrambler with DLL side-loading. Learn to detect &...

    XZ Utils Backdoor: Supply Chain Vulnerability (CVE-2024-3094)
    XZ Utils Backdoor: Supply Chain Vulnerability (CVE...

    Discover XZ Utils, renowned for high compression & data integrity. Learn about recent CVE-2024-3094...

    Raspberry Robin, Not a Juicy Raspberry You Love
    Raspberry Robin, Not a Juicy Raspberry You Love

    Don't be fooled by the name! Raspberry Robin malware targets businesses, uses Discord & exploits...

    Unveiling the ScreenConnect Authentication Bypass (CVE-2024-1709 & CVE-2024-1708)
    Unveiling the ScreenConnect Authentication Bypass ...

    Explore the critical ScreenConnect CVE-2024-1709 & 1708 vulnerabilities and their impact on...

    Pikabot: A Sophisticated and Modular Backdoor Trojan with Advanced Evasion Techniques
    Pikabot: A Sophisticated and Modular Backdoor Troj...

    Explore Pikabot, a modular backdoor trojan with sophisticated evasion methods. Learn about its...

    Emerging Threat: APT-29 – The Not So Cozy Bear
    Emerging Threat: APT-29 – The Not So Cozy Bear

    APT-29, also known as Cozy Bear, is a Russian cyber espionage group. It's known for its...

    1 2
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy