• Detecting and Responding to Trojanized 3CX Desktop Applications

    By Santosh Nepal and Anish Bogati; Security ResearchUpdated on 21st AprilQuick Digest:When a new application [...]

  • Update: Speed up incident response with enhanced observability

    Alert fatigue and analyst burnout continue to be a major challenge for SOC teams with [...]

  • Logpoint’s Top Ten MITRE ATT&CK Techniques

    Executive Summary Starting in 2022, Logpoint Security Research Team has set out on a [...]

  • On Demand: Webinar – Speed up incident response with enhanced observability

    The latest update of Logpoint’s Converged SIEM is here!Security analysts will receive a wide set [...]

  • Emerging Threat: AgentTesla – A Review and Detection Strategies

    AgentTesla [S0331] a.k.a Negasteal is a .NET-based Remote Administrator Tool (RAT) first detected in [...]

  • Threat Hunting: Get tooled up – All you need to know.

    Threat hunting. What do you know about it? You hear it and read about it, [...]

  • CVE-2023-23397: Detecting exploitation of zero-day Exchange server vulnerabilities

    by Nilaa Maharjan and Anish Bogati, Security ResearchA serious vulnerability tagged CVE-2023-23397 has recently been [...]

  • OneNote Malicious Attachment as Initial Vector – Detect, Investigate, and Remediate using Logpoint

    Attackers are using OneNote files to infiltrate systems by embedding malicious payloads, with OneNote becoming [...]

  • ESXiArgs Ransomware: never too early to jump the gun

    VMware ESXi hypervisor allows organizations to host multiple virtual systems on a single physical [...]

  • On Demand: Accelerate TDIR with AgentX Endpoint Security.

    Introducing AgentX, a brand new Endpoint Security element that's native to our Converged SIEM platform.AgentX [...]

  • HIPAA: Cybersecurity and the Health Insurance Portability and Accountability Act

    HIPAA (Health Insurance Portability and Accountability Act) was passed in the USA in 1996. The [...]

  • Introducing AgentX: Improve detection and remediation of threats in endpoints

    By Sergio Lozano Álvarez, Product Marketing ManagerMany mid-size organizations lack the resources and/or knowledge for [...]