• English
    • Deutsch
    Logpoint
    • Products
        • Cyber Defense Platform
          • SIEM
          • NDR
        • Add-ons
          • Automation
        • Integrations
          • Marketplace
      • About our Products
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Multitenancy
        • Data Privacy Control
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Threat detection and incident response
      • Industry
        • Education
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Products
      • Cyber Defense Platform
        • SIEM
        • NDR
      • Add-ons
        • Automation
        • Case Management
      • Integrations
        • Microsoft Defender XDR
        • Marketplace
      • About our Products
        • Product Security
        • SIEM Sizing Calculator
        • Product Demo Tours
        • 2024 Gartner® MQ™ for SIEM
      • Product Features
        • Endpoint Security
        • Multitenancy
        • Data Privacy Control
        • SAP Security
        • MITRE ATT&CK Framework
    • Solutions
      • Use Cases
        • Top 10 use cases
        • Compliance
        • Threat detection and incident response
        • SAP Security
        • Security Operations
        • Insider threat protection
        • Infrastructure and cloud security
      • Industry
        • Education
        • Retail
        • Public Administration
        • Financial Services
        • Critical Infrastructure
        • Healthcare & Pharma
        • Manufacturing
        • Hospitality & Services
      • Customers
        • Customer cases
    • Pricing
    • Resources & Support
      • Resources
        • Blog
        • Webinars
        • Events
        • Brochures & Whitepapers
        • Media Room
      • Support & Services
        • Logpoint Support & Services
        • Contact Us
        • Training
      • Get Started
        • Documentation
        • Community
        • Logpoint Academy
    • Partner resources
      • Find a channel or MSSP partner
      • Become a partner
      • Partner portal
    • Book a demo
    Get a demo

    Blog – Latest Research, Trends, and Insights

    How to detect lateral movement before it spreads
    How to detect lateral movement before it spreads

    Detect and stop lateral movement early with unified SIEM + NDR visibility. Expose hidden threats,...

    Comprehensive Ransomware Detection for UK Public Healthcare
    Comprehensive Ransomware Detection for UK Public H...

    Ransomware attacks on UK healthcare are rising. Discover how Logpoint detection rules help NHS...

    When geopolitics goes digital: NATO, Russia, and state-backed cyber attacks
    When geopolitics goes digital: NATO, Russia, and s...

    The roots of today’s NATO–Russia tensions lie in Cold War geopolitics. Explore how hybrid warfare...

    XWorm RAT analysis: Steal,
 persist & control
    XWorm RAT analysis: Steal,
 persist & control

    XWorm is no ordinary RAT. It shapes-shifts to fit an operator’s needs. In our hands-on tests we...

    Why cyber sovereignty matters in today’s threat landscape
    Why cyber sovereignty matters in today’s threat la...

    Discover how EU organizations can achieve NIS2 compliance and true digital sovereignty with CIS18...

    Citrix Vulnerabilities Rising – When Gateways Give Way
    Citrix Vulnerabilities Rising – When Gateways Give...

    Citrix has issued an urgent warning about multiple vulnerabilities in NetScaler ADC and NetScaler...

    Akira in the Network: From SonicWall Access to Ransomware Deployment
    Akira in the Network: From SonicWall Access to Ran...

    SonicWall confirms active exploitation of an as-yet-unnamed 0-day on their Gen 7 firewalls’ SSL...

    APT28’s New Arsenal: LAMEHUG, the First AI-Powered Malware
    APT28’s New Arsenal: LAMEHUG, the First AI-Powered...

    Over the past few years, we’ve all been aware of the devastating war that has unfolded between...

    ToolShell: When SharePoint Becomes a Gateway to RCE
    ToolShell: When SharePoint Becomes a Gateway to RC...

    By Ujwal Thapa and Anish Bogati; Security Research Microsoft’s Security Response Center (MSRC)...

    Boosting Threat Detection with NDR and Logpoint SIEM
    Boosting Threat Detection with NDR and Logpoint SI...

    Er din organisation klar til at leve op til de skærpede cybersikkerhedskrav i NIS2-direktivet?Med...

    Sådan understøtter Logpoint NIS2-kravene til hændelseshåndtering
    Sådan understøtter Logpoint NIS2-kravene til hænde...

    Er din organisation klar til at leve op til de skærpede cybersikkerhedskrav i NIS2-direktivet?Med...

    The Impacket Arsenal: A Deep Dive into Impacket Remote Code Execution Tools
    The Impacket Arsenal: A Deep Dive into Impacket Re...

    In today’s evolving threat landscape, we continually see new threat actors emerge and novel attack...

    1 2 3 4 5
    Logpoint

    We safeguard society in a digital world

    • Products
      • Cyber Defense Platform
      • SIEM
      • NDR
      • Automation
      • Pricing
      • Sizing Calculator
    • Why Logpoint?
      • Customer Cases
      • Newsletter
    • Company
      • About us
      • Careers at Logpoint
      • Media Room
      • Blog & Webinars
    • Support
      • Service Desk
      • Documentation
      • Community
      • Contact
      • Status

    Contact

    info@logpoint.com
    +45 7060 6100

    Copyright © 2025, Logpoint. All rights reserved.│ Privacy policy