1,000+ Customers, 12 years of best-in-class solutions
SIEM
NDR
Automation
Case Management
Product Security
SIEM Sizing Calculator
Product Demo Tours
Early Access Program
Marketplace
2024 Gartner® MQ™ for SIEM
Endpoint Security
Multitenancy
Data Privacy Control
SAP Security
MITRE ATT&CK Framework
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Webinars
Events
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Training
Documentation
Community
Logpoint Academy
Emerging Threats
The Dukes, or Cozy Bear, is a heavily financed, deeply dedicated, and efficiently coordinated cyber [...]
By Nischal Khadgi, Swachchhanda Shrawan Poudel, and Anish Bogati - (Security Research Team)Fast FactsWith over [...]
Fast FactsEmerging in March 2023, Akira ransomware has been grabbing daily headlines with its relentless [...]
Fast FactsTop 5 most active ransomware groups for the months of June and July 2023. [...]
Fast FactsLockBit is a highly persistent and sophisticated ransomware that operates on the Ransomware-as-a-Service (RaaS) [...]
Updated July 18, 2023Fast FactsCVE-2023-36884 is an Office and Windows HTML Remote Code Execution Vulnerability.No [...]
Executive Summary BianLian ransomware surfaced in June 2022 and has been a persistent threat to [...]
Executive SummaryMultiple vulnerabilities in MOVEit Transfer tracked as CVE-2023-34362, CVE-2023-35036, and CVE-2023-35708 were found.Mentioned vulnerabilities are [...]
Executive Summary Vice Society is a relatively new Russian-speaking hacking group that arose in the [...]
Most organizations have infrastructures that span both on-premise and the cloud. To manage identities across [...]
by Anish Bogati & Rabindra Dev Bhatta, Security Research - Updated May 8th 2023PaperCut is [...]
By Swachchhanda Shrawan Poudel & Anish Bogati; Security ResearchRedLine Stealer, the malicious software that was [...]