• Webinar: Integrating Logpoint with ticketing systems

    Presenters: Paul Gower, Director Sales EngineeringSergio Lozano Alvarez, Product Marketing ManagerLogpoint ingests log data from multiple [...]

  • The Story of regreSSHion: A Resurfaced sshd Vulnerability

    In cybersecurity, vulnerabilities are like ghosts from the past, appearing unexpectedly and haunting us. Such [...]

  • Defending Against OS Credential Dumping: Threat Landscape, Strategies, and Best Practices

    Fast Facts OS Credential Dumping (T1003) is a critical cybersecurity threat. It involves stealing credential [...]

  • APT28: Inside Forest Blizzard’s New Arsenal

    Fast Facts:The Cyber espionage group Forest Blizzard is attributed to the GRU (Russia's military intelligence [...]

  • Webinar on Demand – How to protect against Insider threats with Logpoint

    Presenters: Paul Gower, Director Sales EngineeringGail Carpenter, Head of Field and Channel MarketingDetecting Inside threats can [...]

  • Unveiling insider threats: the crucial role of UEBA in cybersecurity

    Every year, 34% of organizations are hit by insider attacks. Because the insider uses valid [...]

  • Webinar On Demand – More control over SecOps with Logpoint’s latest release

    Presenters: Sergio Lozano Álvarez, Product Marketing ManagerSikander Bahadur Kunwar, Product OwnerOne of the main challenges SOC [...]

  • Kapeka: A new toolkit in Arsenal of SandStorm

    FAST FACTSKapeka, also known as KnuckleTouch, originally appeared in mid-2022 but was formally tracked in 2024 [...]

  • Dynamic Link Dazzle: Unveiling the Dark Side of DLLs

    Fast facts:DLL side-loading is a technique for executing malicious payloads inside a masqueraded DLL by [...]

  • Logpoint’s latest release: Gain control over your security operations

    Organizations depend on their security analyst to detect, investigate, and respond to any security incident, [...]

  • The multitenant dilemma: Gaining more control over user access without compromising data isolation

    One of the main challenges for security professionals is the increasing number of silos. Among [...]

  • Beginners guide to SAP Security: Why is it important and how does it work?

    Organizations widely use SAP systems to perform daily operations throughout almost every step of the [...]