
Kubernetes Threat Hunting using API Server Audit Logs
Kubernetes has emerged as the preferred platform for deploying and managing containerized applications in contemporary IT environments. As its adoption [...]

Announcing a new integration between Logpoint and Microsoft Defender XDR
Relying solely on a single security tool can leave vulnerabilities that attackers may exploit. While Microsoft Defender offers robust protection—especially [...]

From Exploit to Ransomware: Detecting CVE-2025-29824
The Microsoft Security blog highlights the active exploitation of CVE-2025-24983, a zero-day vulnerability in the Windows Common Log File System [...]

ClickFix: Another Deceptive Social Engineering Technique
Fast FactsClickFix, first observed in mid-2024, represents a sophisticated form of social engineering that quickly gained traction among adversaries.ClickFix has [...]

Reduce operational burden and gain efficiency with Logpoint’s latest release
Security Operations Centers (SOCs) and Managed Security Service Providers (MSSPs) are under immense pressure to keep pace with an [...]

Windows Shell Link Vulnerability ZDI-CAN-25373: Detecting Hidden Commands
One of the latest vulnerabilities disclosed by TrendMicro, ZDI-CAN-25373, exposes a flaw in Windows shortcut (.LNK) files that allow attackers [...]
State of Managed Security services: How MSSPs can Capture New Business
European organizations need help managing their cybersecurity. With a threat landscape constantly developing, threats becoming more difficult to detect, [...]

Logpoint 2025 predictions: Cybersecurity in transformation
The year 2025 is upon us, and it’s time to reflect on what’s in store for the cybersecurity industry. [...]

EDR Killers: After All, EDRs Are Not Invincible
Fast Facts: EDR Killers are a growing cybersecurity threat, gaining prominence in 2024 and 2025. Widely deployed by ransomware groups, [...]

Director’s latest release: Take Total Control of Your MSSP Business
As Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) continue to play a critical role in safeguarding organizations, [...]

Exploring Strela Stealer: Initial Payload Analysis and Insights
In cybersecurity research, it's easy to get caught up in the pursuit of uncovering new threats. However, sometimes, the most [...]

Hiding in Plain Sight: The Subtle Art of Loki Malware’s Obfuscation
With the surge of cyberattacks, sharing threat intelligence in the form of insights, trends, and samples is crucial to combat [...]