1,000+ Customers, 12 years of best-in-class solutions
Converged SIEM
SIEM
SOAR
UEBA
Endpoint Security
SAP Security
Multitenancy
Product Security
SIEM Sizing Calculator
MITRE ATT&CK framework
Product Demo Tours
Early Access Program
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Emerging Threats
Webinars
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Documentation
Community
The Dukes, or Cozy Bear, is a heavily financed, deeply dedicated, and efficiently coordinated cyber [...]
By Nischal Khadgi, Swachchhanda Shrawan Poudel, and Anish Bogati - (Security Research Team)Fast FactsWith over [...]
Fast FactsEmerging in March 2023, Akira ransomware has been grabbing daily headlines with its relentless [...]
Fast FactsTop 5 most active ransomware groups for the months of June and July 2023. [...]
Fast FactsLockBit is a highly persistent and sophisticated ransomware that operates on the Ransomware-as-a-Service (RaaS) [...]
Updated July 18, 2023Fast FactsCVE-2023-36884 is an Office and Windows HTML Remote Code Execution Vulnerability.No [...]
Executive Summary BianLian ransomware surfaced in June 2022 and has been a persistent threat to [...]
Executive SummaryMultiple vulnerabilities in MOVEit Transfer tracked as CVE-2023-34362, CVE-2023-35036, and CVE-2023-35708 were found.Mentioned vulnerabilities are [...]
Executive Summary Vice Society is a relatively new Russian-speaking hacking group that arose in the [...]
Most organizations have infrastructures that span both on-premise and the cloud. To manage identities across [...]
by Anish Bogati & Rabindra Dev Bhatta, Security Research - Updated May 8th 2023PaperCut is [...]
By Swachchhanda Shrawan Poudel & Anish Bogati; Security ResearchRedLine Stealer, the malicious software that was [...]