• Detecting and Responding to Compromises in Azure AD through AAD Connect

    Most organizations have infrastructures that span both on-premise and the cloud. To manage identities across [...]

  • PaperCut Vulnerability CVE-2023-27350: Detecting exploitation attempts

    by Anish Bogati & Rabindra Dev Bhatta, Security Research - Updated May 8th 2023PaperCut is [...]

  • Phishing: Logpoint SOAR deep dive – Achieving a 77% reduction in time to resolution

    Phishing is a cyber-attack where an adversary sends fraudulent emails, text messages, or other electronic [...]

  • On Demand: The Importance of Cybersecurity Technology in SAP Business Transformation

    The webinar is now on demand and is hosted by Logpoint and has Marc Noergaard [...]

  • Emerging Threat: RedLine Stealer Malware Outbreak – A Comprehensive Guide to Anatomy, Detection, and Response

    By Swachchhanda Shrawan Poudel & Anish Bogati; Security ResearchRedLine Stealer, the malicious software that was [...]

  • Microsoft Sentinel – When free becomes expensive

    When purchasing a new security solution, decision-making is rarely an individual process but rather an [...]

  • A comprehensive guide to detecting Ransomware-as-a-Service using Logpoint

    By Nilaa Maharjan and Anish Bogati, Security Research Foreword: Ransomware is a type of [...]

  • SAP Security: How can you effectively implement a Security Incident Response solution?

    Incident response follows threat detection, and is usually the last step leading up to a [...]

  • When Zero Day Meets Ransomware: CVE-2023-28252 and Nokoyawa Ransomware

    Microsoft has addressed a critical zero-day vulnerability actively exploited in the wild and has released [...]

  • Secure your sensitive assets in SuccessFactors against misuse

    Successfully detect, monitor, and mitigate compliance risks with a holistic vulnerability management solution.SAP SuccessFactors is [...]

  • On Demand: Webinar – Why NIS2 is a Gamechanger

    On-demand Webinar Why NIS2 is a Gamechanger The NIS2 directive adopted by the European Parliament [...]

  • Enhanced overview in Director, and reduced MTTR – What MSSPs can expect

    In the current cybersecurity landscape, MSSPs play a crucial role in delivering the management and [...]