• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    The Story of regreSSHion: A Resurfaced sshd Vulnerability
    The Story of regreSSHion: A Resurfaced sshd Vulner...

    In cybersecurity, vulnerabilities are like ghosts from the past, appearing unexpectedly and...

    Defending Against OS Credential Dumping: Threat Landscape, Strategies, and Best Practices
    Defending Against OS Credential Dumping: Threat La...

    Fast Facts OS Credential Dumping (T1003) is a critical cybersecurity threat. It involves...

    APT28: Inside Forest Blizzard’s New Arsenal
    APT28: Inside Forest Blizzard’s New Arsenal

    Fast Facts: The Cyber espionage group Forest Blizzard is attributed to the GRU (Russia’s...

    Kapeka: A new toolkit in Arsenal of SandStorm
    Kapeka: A new toolkit in Arsenal of SandStorm

    FAST FACTS Kapeka, also known as KnuckleTouch, originally appeared in mid-2022 but was...

    Dynamic Link Dazzle: Unveiling the Dark Side of DLLs
    Dynamic Link Dazzle: Unveiling the Dark Side of DL...

    Fast facts: DLL side-loading is a technique for executing malicious payloads inside a...

    Logpoint’s latest release: Gain control over your security operations
    Logpoint’s latest release: Gain control over your ...

    Organizations depend on their security analyst to detect, investigate, and respond to any...

    Beginners guide to SAP Security: Why is it important and how does it work?
    Beginners guide to SAP Security: Why is it importa...

    Organizations widely use SAP systems to perform daily operations throughout almost every step...

    XZ Utils Backdoor: Supply Chain Vulnerability (CVE-2024-3094)
    XZ Utils Backdoor: Supply Chain Vulnerability (CVE...

    Introduction XZ Utils is a set of open-source compression utilities for compressing and...

    Raspberry Robin, Not a Juicy Raspberry You Love
    Raspberry Robin, Not a Juicy Raspberry You Love

    Fast facts Raspberry Robin, previously disseminated through USB drives, now employs Discord...

    Inside DarkGate: Exploring the infection chain and capabilities
    Inside DarkGate: Exploring the infection chain and...

    As the threat landscape continually evolves, some positive developments, such as authorities...

    A Comprehensive Overview on Stealer Malware Families
    A Comprehensive Overview on Stealer Malware Famili...

    Fast Facts Over the last seven years, there has been a noticeable increase in the sale and...

    Unveiling the ScreenConnect Authentication Bypass (CVE-2024-1709 & CVE-2024-1708)
    Unveiling the ScreenConnect Authentication Bypass ...

    On February 19, 2024, ConnectWise issued a critical advisory concerning two highly concerning...

    2 3 4 5 6
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy