• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    XWorm RAT analysis: Steal,
 persist & control
    XWorm RAT analysis: Steal,
 persist & control

    XWorm is a stealthy remote access tool that often arrives in an ordinary message and can end...

    Why cyber sovereignty matters in today’s threat landscape
    Why cyber sovereignty matters in today’s threat la...

    Europe is in the middle of a geopolitical storm. Sabotage of undersea cables disrupts global...

    Citrix Vulnerabilities Rising – When Gateways Give Way
    Citrix Vulnerabilities Rising – When Gateways Give...

    Citrix has issued an urgent warning about multiple vulnerabilities in NetScaler ADC and...

    Akira in the Network: From SonicWall Access to Ransomware Deployment
    Akira in the Network: From SonicWall Access to Ran...

    SonicWall confirms active exploitation of an as-yet-unnamed 0-day on their Gen 7 firewalls’...

    APT28’s New Arsenal: LAMEHUG, the First AI-Powered Malware
    APT28’s New Arsenal: LAMEHUG, the First AI-Powered...

    Over the past few years, we’ve all been aware of the devastating war that has unfolded between...

    ToolShell: When SharePoint Becomes a Gateway to RCE
    ToolShell: When SharePoint Becomes a Gateway to RC...

    By Ujwal Thapa and Anish Bogati; Security Research Microsoft’s Security Response Center (MSRC)...

    Boosting Threat Detection with NDR and Logpoint SIEM
    Boosting Threat Detection with NDR and Logpoint SI...

    2 July 2025, 10:30 – 11:15 Join us for an exclusive live webinar, where Paul Gower and...

    Sådan understøtter Logpoint NIS2-kravene til hændelseshåndtering
    Sådan understøtter Logpoint NIS2-kravene til hænde...

    D. 1 juli 2025, 10:30 – 11:15 Er din organisation klar til at leve op til de skærpede...

    The Impacket Arsenal: A Deep Dive into Impacket Remote Code Execution Tools
    The Impacket Arsenal: A Deep Dive into Impacket Re...

    In today’s evolving threat landscape, we continually see new threat actors emerge and novel...

    Frontline Intel: Pinpointing GRU’s TTPs in the Recent Campaign
    Frontline Intel: Pinpointing GRU’s TTPs in the Rec...

    Joint Cybersecurity Advisory (CSA) AA25-141Aexposes a sustained and multifaceted...

    Tricked by trust: How OAuth and device code flows get abused
    Tricked by trust: How OAuth and device code flows ...

    In today’s cloud-first environments, access tokens have become the new keys to the kingdom....

    Webinar: Elevate your security with Microsoft Defender XDR Integration
    Webinar: Elevate your security with Microsoft Defe...

    21 May 2025, 10:00 – 11:00 CET We’re excited to invite you to an exclusive webinar, where...

    1 2 3 4 5
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy