• Boosting Threat Detection with NDR and Logpoint SIEM

     2 July 2025, 10:30 - 11:15Join us for an exclusive live webinar, where Paul Gower [...]

  • Sådan understøtter Logpoint NIS2-kravene til hændelseshåndtering

     D. 1 juli 2025, 10:30 - 11:15Er din organisation klar til at leve op til [...]

  • Frontline Intel: Pinpointing GRU’s TTPs in the Recent Campaign

    Joint Cybersecurity Advisory (CSA) AA25-141A exposes a sustained and multifaceted cyber-espionage campaign attributed to Russia’s [...]

  • The Impacket Arsenal: A Deep Dive into Impacket Remote Code Execution Tools

    In today's evolving threat landscape, we continually see new threat actors emerge and novel attack [...]

  • Tricked by trust: How OAuth and device code flows get abused

    In today’s cloud-first environments, access tokens have become the new keys to the kingdom. Attackers [...]

  • Webinar: Elevate your security with Microsoft Defender XDR Integration

     21 May 2025, 10:00 - 11:00 CETWe’re excited to invite you to an exclusive webinar, [...]

  • Webinar on demand: The ROI of SOC

     Join cybersecurity leaders from G'Secure Labs and Logpoint as they break down what truly defines [...]

  • Kubernetes Threat Hunting using API Server Audit Logs

    Kubernetes has emerged as the preferred platform for deploying and managing containerized applications in contemporary [...]

  • Announcing a new integration between Logpoint and Microsoft Defender XDR

    Relying solely on a single security tool can leave vulnerabilities that attackers may exploit. While [...]

  • Webinar: Driving value and security to customers for MSSPs

     29 April 2025, 10:30 CETAs a MSSP, delivering value and security to your customers is [...]

  • From Exploit to Ransomware: Detecting CVE-2025-29824

    The Microsoft Security blog highlights the active exploitation of CVE-2025-24983, a zero-day vulnerability in the [...]

  • ClickFix: Another Deceptive Social Engineering Technique

    Fast FactsClickFix, first observed in mid-2024, represents a sophisticated form of social engineering that quickly [...]