Threat Research

Threat Detection

Threat Research

Loginsoft’s System-41 offers advanced threat analytics to detect potential cyber threats. By adopting a threat-informed approach and encompassing the entire cyber operations process, from threat intelligence to threat detection, System-41 ensures that your team has access to the most up-to-date, expertly-crafted hunting content and tools to streamline and optimize the hunting process. With System-41, you can improve team efficiency, enhance threat detection capabilities, and protect your organization against the ever-evolving landscape of cybersecurity threats.

Over 800 organizations found themselves listed on ransomware sites lurking in the depths of the dark web, indicating an increase in victims by approx. 20% compared to the previous quarter…

The world of cybersecurity is constantly evolving, with new threats emerging every day. One of the latest threats to emerge is the use of CVE-2023-27350 by…

IcedID, the notorious malware, is actively involved in several delivery campaigns, demonstrating versatility and adaptability. The latest IcedID variants indicate the malware’s continuous evolution, and…

Initially, Qakbot spreads using malicious email attachments, drive-by-download attacks, or other forms of social engineering. The recent variants of…

OneNote has been highly cherished by Threat Actors (TAs) in recent months. Unfortunately, many malware…

Aurora Stealer a non-friendly program in your neighborhood developed in Go-lang. The malware was developed for threat actors to steal victims’ sensitive data..

GitHub Repositories

zeek-scripts
zeek scripts for CVE detection and Threat Hunt
oval4malw
Using OVAL for Malware Detection
detection-rules
Threat Detection & Anomaly Detection rules for popular open-source components
OVAL-Repository
Loginsoft OVAL repository for the security content