Vulnerability Research

Threat Detection

Vulnerability Research

Loginsoft Vulnerability Research rules provides visibility for enterprises to quickly identify the attacks or attack attempts thus allowing a SOC analyst and first incident responders to easily prioritize the events and automate the further investigations. Upon diligent research we provide the threat detection patterns of all known exploits of a widely used components/software. The following are a few components which we were able to generate detection patterns.

Recent Research

CVE Component Sigma
CVE-2017-7529nginx
CVE-2013-4547nginx
CVE-2013-2028nginx
CVE-2010-2266nginx
CVE-2010-2263nginx
CVE-2009-4487nginx
CVE-2009-3898nginx
CVE-2018-16845nginx

GitHub Repositories

zeek-scripts
zeek scripts for CVE detection and Threat Hunt
oval4malw
Using OVAL for Malware Detection
detection-rules
Threat Detection & Anomaly Detection rules for popular open-source components
OVAL-Repository
Loginsoft OVAL repository for the security content