• Update: Speed up incident response with enhanced observability

    Alert fatigue and analyst burnout continue to be a major challenge for SOC teams with up to 11,000 security [...]

  • Emerging Threats: AgentTesla – A Review and Detection Strategies

    AgentTesla [S0331] a.k.a Negasteal is a .NET-based Remote Administrator Tool (RAT) first detected in 2014. It is advertised as [...]

  • Threat Hunting: Get tooled up – All you need to know.

    Threat hunting. What do you know about it? You hear it and read about it, but how much do you [...]

  • CVE-2023-23397: Detecting exploitation of zero-day Exchange server vulnerabilities

    by Nilaa Maharjan and Anish Bogati, Security ResearchA serious vulnerability tagged CVE-2023-23397 has recently been released to the public after [...]

  • OneNote Malicious Attachment as Initial Vector – Detect, Investigate, and Remediate using Logpoint

    Attackers are using OneNote files to infiltrate systems by embedding malicious payloads, with OneNote becoming a popular option after macros [...]

  • ESXiArgs Ransomware: never too early to jump the gun

    VMware ESXi hypervisor allows organizations to host multiple virtual systems on a single physical server. A global ransomware campaign [...]

  • HIPAA: Cybersecurity and the Health Insurance Portability and Accountability Act

    HIPAA (Health Insurance Portability and Accountability Act) was passed in the USA in 1996. The objective of the law was [...]

  • Introducing AgentX: Improve detection and remediation of threats in endpoints

    By Sergio Lozano Álvarez, Product Marketing ManagerMany mid-size organizations lack the resources and/or knowledge for an EDR (Endpoint Detection and [...]

  • Hacker as a Service: What is it?

    Cybersecurity has become a major concern for businesses and individuals alike. With the increasing amount of sensitive information being stored [...]

  • Russia V Ukraine: Round two – Gamma Edition

    By Nilaa Maharjan; Logpoint Global Services & Security ResearchContentsWhat has happened?Anticipating the anniversaryGamaredon: Who are they?The impact of these malware [...]

  • Critical Infrastructure: Financial Data

    Cybersecurity is an essential practice for safeguarding data within business-critical systems and applications.Criminals are likely to target the sectors where [...]

  • PCI-DSS: Cybersecurity and the Payment Card Industry

    PCI-DSS is a set of security standards designed to ensure that all companies that accept, process, store, or transmit credit [...]