Stay up to date with the latest & greatest
- 11 Topics
- 23 Replies
Our research team have been taking an in depth look at ChromeLoader. An innocent looking malvertiser that masquerades as a cracked game or a pirated movie sometimes placed on social media.Read here ⇉ https://bit.ly/3N2vHEo and download the report here ⇉ https://bit.ly/3tRZZDc to ensure you’re taking the best steps to remain protected.#SIEM #SIEMSOAR #Cyberthreats #CyberSecurity #Malware
Spring has finally sprung! But this #Bumblebee isn’t interested in pollination - This one’s a malicious downloader.
In the third instalment of our Emerging Threats series our researchers took a look at Bumblebee’s evolution and determined how you can best protect your organisation with in-depth analysis and response via #Logpoint For the full article, click here: https://www.logpoint.com/en/blog/buzz-of-the-bumblebee-a-new-malicious-loader/
We have released the BoxAudit_v5.1.1 application publicly in the Help Centre. To find out more, you can find the application package here: https://servicedesk.logpoint.com/hc/en-us/articles/360002071597 and the documentation here: https://docs.logpoint.com/docs/boxaudit/en/latest/
Join Sales Engineer @Nils Krumey on October 5 on a live session where he will demo how the new update to LogPoint can help security analysts react to and resolve threats quickly by knowing instantly which type of threat it is. Join the knowledge session to:- Learn how the new categorisation of alerts and incidents to the MITRE framework can speed up incident response- See how you now can share search and report templates- Understand how LogPoint is making it easy to route incidents to different SOAR playbooks based on the incident type Register on the link below:https://lnkd.in/ggg9pvMH
Hi @all, do anyone have an Idea how to alarm a missing Event like:Every Morning around 4 there should be a “successful copy” Event. I want to Alarm if exactly this Event is missing.The Alarm should fire around 6 and not much later. My only Idea is to run a scheduled Report because i can’t configure the ALarm to rum exactly in the Timeframe of 2 hours. Am i wrong?
Remember to read the latest BlogpostWatch out for PetitPotam, a relay attack that can compromise your domain without any authentication. In this blog post, our Security Analytics Engineer Babesh Rai takes you through all you need to know to mitigate the threat and detect the attack chain in LogPointRead the post here: https://www.logpoint.com/en/blog/detecting-petitpotam-a-relay-attack-that-can-compromise-your-domain-without-any-authentication/ / Brian
Already have an account? Login
Login to the community
Already a Partner or Customer? Login with your LogPoint Support credentials. Don‘t have a LogPoint Support account? Ask your local LogPoint Representative. Only visiting? Login with LinkedIn to gain read–access.LOGIN AS PARTNER OR CUSTOMER Login with LinkedIn
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.