• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • Early Access Program
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a Demo

    Blog – Latest Research, Trends, and Insights

    Why cyber sovereignty matters in today’s threat landscape
    Why cyber sovereignty matters in today’s threat la...

    Europe is in the middle of a geopolitical storm. Sabotage of undersea cables disrupts global...

    Citrix Vulnerabilities Rising – When Gateways Give Way
    Citrix Vulnerabilities Rising – When Gateways Give...

    Citrix has issued an urgent warning about multiple vulnerabilities in NetScaler ADC and...

    Akira in the Network: From SonicWall Access to Ransomware Deployment
    Akira in the Network: From SonicWall Access to Ran...

    SonicWall confirms active exploitation of an as-yet-unnamed 0-day on their Gen 7 firewalls’...

    APT28’s New Arsenal: LAMEHUG, the First AI-Powered Malware
    APT28’s New Arsenal: LAMEHUG, the First AI-Powered...

    Over the past few years, we’ve all been aware of the devastating war that has unfolded between...

    ToolShell: When SharePoint Becomes a Gateway to RCE
    ToolShell: When SharePoint Becomes a Gateway to RC...

    By Ujwal Thapa and Anish Bogati; Security Research Microsoft’s Security Response Center (MSRC)...

    Boosting Threat Detection with NDR and Logpoint SIEM
    Boosting Threat Detection with NDR and Logpoint SI...

    2 July 2025, 10:30 – 11:15 Join us for an exclusive live webinar, where Paul Gower and...

    Sådan understøtter Logpoint NIS2-kravene til hændelseshåndtering
    Sådan understøtter Logpoint NIS2-kravene til hænde...

    D. 1 juli 2025, 10:30 – 11:15 Er din organisation klar til at leve op til de skærpede...

    The Impacket Arsenal: A Deep Dive into Impacket Remote Code Execution Tools
    The Impacket Arsenal: A Deep Dive into Impacket Re...

    In today’s evolving threat landscape, we continually see new threat actors emerge and novel...

    Frontline Intel: Pinpointing GRU’s TTPs in the Recent Campaign
    Frontline Intel: Pinpointing GRU’s TTPs in the Rec...

    Joint Cybersecurity Advisory (CSA) AA25-141Aexposes a sustained and multifaceted...

    Tricked by trust: How OAuth and device code flows get abused
    Tricked by trust: How OAuth and device code flows ...

    In today’s cloud-first environments, access tokens have become the new keys to the kingdom....

    Webinar: Elevate your security with Microsoft Defender XDR Integration
    Webinar: Elevate your security with Microsoft Defe...

    21 May 2025, 10:00 – 11:00 CET We’re excited to invite you to an exclusive webinar, where...

    Webinar on demand: The ROI of SOC
    Webinar on demand: The ROI of SOC

    Join cybersecurity leaders from G’Secure Labs and Logpoint as they break down what truly...

    1 2 3 4 5
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy