We are a team of research engineers working on innovative security programs related to Zero-Day Discovery, Threat Detection, Threat Hunting, Threat Intelligence. Our expertise spans a wide range of services in the following areas and if you need consulting resources to work around these innovations, we encourage you to explore this page or contact us to schedule a quick demo.
What’s New at Loginsoft Research
Loginsoft PursuitX Malware Threat Intelligence API
Use our API to monitor various adversaries by tracking the attack behavior comprising TTPs and collect relevant log events to generate detection rules specific to a malware family or a threat actor.
Learn MoreLoginsoft-OSINT Transforms for Maltego
Use Loginsoft-OSINT Transforms to detect disposable phone numbers and obtain relevant meta-data.
Learn MoreThese Sigma rules by Loginsoft pick up my idea of rules based on error messages found in open source projects.

Florian Roth
@cyb3rop
Nextron Systems
Yara Rules
Hunt for Malicious Documents targeting Microsoft Office format using our Yara rules. For better visibility of our research feel free to use our mind-map. You can import it using any mind-map software…
Explore Yara Rules Mind MapsSecurity Advisories
Our expert-level engineers research and discover vulnerabilities in open source Web Frameworks, Binaries and Firmware. We are proud to share that all our research findings have been accepted and acknowledged…
Explore FindingsThreat Detection
Loginsoft’s proven Threat Detection rules provide the visibility for enterprises to quickly identify attacks or attack attempts and enable a SOC analyst and first incident responder to easily prioritize the events and…
Explore Threat Detection RulesIP Reputation
Our Threat Intelligence feed comprises Mirai-like botnet variants which are detected from our worldwide network of honeypots and reports abusive IP Addresses engaged in hacking attempts, probing…
Explore Honeypots