Update: Speed up incident response with enhanced observability
Alert fatigue and analyst burnout continue to be a major challenge for SOC teams with up to 11,000 security [...]
Emerging Threats: AgentTesla – A Review and Detection Strategies
AgentTesla [S0331] a.k.a Negasteal is a .NET-based Remote Administrator Tool (RAT) first detected in 2014. It is advertised as [...]
Threat Hunting: Get tooled up – All you need to know.
Threat hunting. What do you know about it? You hear it and read about it, but how much do you [...]
CVE-2023-23397: Detecting exploitation of zero-day Exchange server vulnerabilities
by Nilaa Maharjan and Anish Bogati, Security ResearchA serious vulnerability tagged CVE-2023-23397 has recently been released to the public after [...]
OneNote Malicious Attachment as Initial Vector – Detect, Investigate, and Remediate using Logpoint
Attackers are using OneNote files to infiltrate systems by embedding malicious payloads, with OneNote becoming a popular option after macros [...]
ESXiArgs Ransomware: never too early to jump the gun
VMware ESXi hypervisor allows organizations to host multiple virtual systems on a single physical server. A global ransomware campaign [...]
HIPAA: Cybersecurity and the Health Insurance Portability and Accountability Act
HIPAA (Health Insurance Portability and Accountability Act) was passed in the USA in 1996. The objective of the law was [...]
Introducing AgentX: Improve detection and remediation of threats in endpoints
By Sergio Lozano Álvarez, Product Marketing ManagerMany mid-size organizations lack the resources and/or knowledge for an EDR (Endpoint Detection and [...]
Hacker as a Service: What is it?
Cybersecurity has become a major concern for businesses and individuals alike. With the increasing amount of sensitive information being stored [...]
Russia V Ukraine: Round two – Gamma Edition
By Nilaa Maharjan; Logpoint Global Services & Security ResearchContentsWhat has happened?Anticipating the anniversaryGamaredon: Who are they?The impact of these malware [...]
Critical Infrastructure: Financial Data
Cybersecurity is an essential practice for safeguarding data within business-critical systems and applications.Criminals are likely to target the sectors where [...]
PCI-DSS: Cybersecurity and the Payment Card Industry
PCI-DSS is a set of security standards designed to ensure that all companies that accept, process, store, or transmit credit [...]