1,000+ Customers, 12 years of best-in-class solutions
SIEM
NDR
Automation
Case Management
Micosoft Defender XDR
Marketplace
Product Security
SIEM Sizing Calculator
Product Demo Tours
Early Access Program
2024 Gartner® MQ™ for SIEM
Endpoint Security
Multitenancy
Data Privacy Control
SAP Security
MITRE ATT&CK Framework
Top 10 use cases
Compliance
Threat detection and incident response
Security Operations
Insider threat protection
Infrastructure and cloud security
Education
Retail
Public Administration
Financial Services
Critical Infrastructure
Healthcare & Pharma
Manufacturing
Hospitality & Services
Customer cases
Blog
Webinars
Events
Brochures & Whitepapers
Media Room
Logpoint Support & Services
Contact Us
Training
Documentation
Community
Logpoint Academy
Emerging Threats
Most organizations have infrastructures that span both on-premise and the cloud. To manage identities across [...]
by Anish Bogati & Rabindra Dev Bhatta, Security Research - Updated May 8th 2023PaperCut is [...]
By Swachchhanda Shrawan Poudel & Anish Bogati; Security ResearchRedLine Stealer, the malicious software that was [...]
Microsoft has addressed a critical zero-day vulnerability actively exploited in the wild and has released [...]
By Santosh Nepal and Anish Bogati; Security ResearchUpdated on 21st AprilQuick Digest:When a new application [...]
AgentTesla [S0331] a.k.a Negasteal is a .NET-based Remote Administrator Tool (RAT) first detected in [...]
by Nilaa Maharjan and Anish Bogati, Security ResearchA serious vulnerability tagged CVE-2023-23397 has recently been [...]
Attackers are using OneNote files to infiltrate systems by embedding malicious payloads, with OneNote becoming [...]
VMware ESXi hypervisor allows organizations to host multiple virtual systems on a single physical [...]
A year on since the first attack on Ukrainian territory and the unofficial beginning of [...]
Executive Summary:First appeared in June 2022, still active and victimizing high-profile targets.Second Highest number of [...]
By Nilaa Maharjan, Security Research.ContentsKey FindingsWhich Products and Versions are Affected?Making a BOLD statementBoldly going [...]