Research Threat Detection

Threat Detection

Threat Detection

Loginsoft Threat Detection rules provides visibility for enterprises to quickly identify the attacks or attack attempts thus allowing a SOC analyst and first incident responders to easily prioritize the events and automate the further investigations. Upon diligent research we provide the threat detection patterns of all known exploits of a widely used components/software. The following are a few components which we were able to generate detection patterns.

Recent Research

CVE Component Sigma
CVE-2017-7529nginx
CVE-2013-4547nginx
CVE-2013-2028nginx
CVE-2010-2266nginx
CVE-2010-2263nginx
CVE-2009-4487nginx
CVE-2009-3898nginx
CVE-2018-16845nginx

Recent blogs

This article explains the importance of early threat detection and illustrates in detail about how a SIEM solution like Splunk can be useful in threat detection and incident response..

Incident Response is the action that you take to restore the ability to deliver organization business service. It is also known as IT incident, computer incident, or security incident. ..