logpoint
-
A vulnerability, which was classified as problematic, has been found in Logpoint up to 7.4.x. Affected by this issue is some unknown functionality of the component Distributed Setup. The manipulation leads to cross-site request forgery. This vulnerability is handled as CVE-2024-48950. The attack may be launched remotely. There is no exploit available. It is recommended…
-
The year 2025 is upon us, and it’s time to reflect on what’s in store for the cybersecurity industry. Developing threats, geopolitics, and regulations will take its toll on security practitioners and call for new approaches, innovative technologies, and a sharper focus on resilience. Luckily, technological advancements show promising results in providing cybersecurity teams with…
-
Security Information & Event Management (SIEM) , Security Operations
-
Skip to content .fusion-meta-info { float:left; margin-right: 5px; } – 3 min read Jump To Section Share This Story Copy
-
Logpoint has announced a new partnership with Prianto in a move the firm said will help MSSPs in central Europe better tackle cyber threats on a larger scale.
-
Logpoint has issued a security advisory for a critical vulnerability in its SAML Authentication module. This flaw, identified as CVE-2024-36383 and rated with a CVSS score of 9.1, could allow attackers to perform arbitrary file deletions through URL injection in the SAML Single Sign-On (SSO) URL response.
-
Each business day MSSP Alert delivers a quick lineup of news, analysis, and chatter from across the MSSP, MSP and cybersecurity world.
-
Cyber security vendor Logpoint has cut the ribbon on a brace of new partner programs for managed security service providers (MSSPs) and channel partners.
-
Skip to content .fusion-meta-info { float:left; margin-right: 5px; } – 1 min read
-
Skip to content .fusion-meta-info { float:left; margin-right: 5px; } – 1 min read
-
Skip to content .fusion-meta-info { float:left; margin-right: 5px; } – 6 min read Table of Contents Share This Story Humans are emotional beings and can be easily manipulated through emotions such as greed, fear, and desire. Attackers exploit these vulnerabilities through social engineering attacks, especially in email-based schemes. This kind of email-based attack has proliferated…