• Phishing and Quishing – Email Investigation and Response Using Logpoint

    Fast FactsPhishing is the most common form of cybercrime, with an estimated 3.4 billion spam [...]

  • Introducing Vulnerability Monitoring Analyzer: Your SAP Security Patch Solution

    Streamline SAP security patch management to safeguard your business from unnecessary threats.SAP continually releases security [...]

  • Emerging Threat: APT-29 – The Not So Cozy Bear

    The Dukes, or Cozy Bear, is a heavily financed, deeply dedicated, and efficiently coordinated cyber [...]

  • Preventing data exfiltration with Logpoint

    Losing control over your organization’s data is one of the main concerns for businesses and [...]

  • Use Case: An example of threat hunting with Converged SIEM

    Originally posted July 2019 - Updated October 2023Threat hunting is gaining relevance by the day [...]

  • CVE-2023-38831: WinRAR – Decompression or Arbitrary Code Execution

    By Nischal Khadgi, Swachchhanda Shrawan Poudel, and Anish Bogati - (Security Research Team)Fast FactsWith over [...]

  • Emerging Threat: Akira, Not a CyberPunk Movie – A Very Real Ransomware Threat

    Fast FactsEmerging in March 2023, Akira ransomware has been grabbing daily headlines with its relentless [...]

  • NIS2 Fines: An overview of possible penalties for non-compliance.

    NIS2 builds on the requirements of the original directive; it still aims to protect critical [...]

  • Reduce time to investigate and respond with practical SOC-focused features

    Nowadays not a day goes by without a cyberattack. In 2022, organizations worldwide detected nearly [...]

  • SAP Vulnerabilities: Critical Patches and Proactive Measures for System Security

    Ensuring the security and reliability of an organization's IT infrastructure is paramount. SAP systems, which [...]

  • The Rise of Zero Trust Network Security: What You Need to Know

    Organizations face an ever-increasing number of sophisticated cyber threats. Traditional network security models, which rely [...]

  • Emerging Threat: Defending Against 8base – Uncovering Their Arsenal and Crafting Responses

    Fast FactsTop 5 most active ransomware groups for the months of June and July 2023. [...]