Loginsoft Blogs

Detecting Atlassian Confluence Exploitation – CVE-2022-26134

Detecting Atlassian Confluence Exploitation – CVE-2022-26134

Context Background Atlassian has published a security advisory CVE-2022-26134 on June 2, for its Confluence Server and Data Center, regarding zero-day vulnerability. Several customer environments were being compromised with the unauthenticated activity and for which...

read more
Cisco Umbrella Reporting Integration with Cortex XSOAR

Cisco Umbrella Reporting Integration with Cortex XSOAR

Security teams are constantly flooded with alerts from multiple systems. Using the Cisco Umbrella Reporting API, security analysts can programmatically pull contextual threat intelligence from the Global Network into their Security Management, Incident, Orchestration...

read more

Open Vulnerability Assessment Language (OVAL) in a Nutshell

Before diving into the OVAL, we shall quickly brief the project from where it has evolved. Overview of SCAP Security Content Automation Protocol (SCAP), a project from NIST is widely adopted by many software and hardware manufacturers as a sophisticated framework of...

read more
Palo Alto Networks Cortex XSOAR Integration

Palo Alto Networks Cortex XSOAR Integration

The changing threat landscape in cybersecurity has highlighted the need for a platform that centralizes intelligence from various sources in order to perform an effective security operation and workflow. Cortex XSOAR combines both security orchestration and incident...

read more
Emerging Threats and Vulnerabilities in Cybersecurity

Emerging Threats and Vulnerabilities in Cybersecurity

Loginsoft Research Team has been monitoring several exploits from the dedicated servers that were deployed globally for the purpose of threat discovery. The team analyzes and enriches this data to identify behavior, methods and intent of the Threat actors. The...

read more
IBM QRadar Use Cases

IBM QRadar Use Cases

What should I build on IBM QRadar to effectively manage and investigate the alerts? The guide for Product Managers to explore Security Use Cases. In an age where cyber threats are widespread, it is important that organizations keep their data secure. The IBM QRadar...

read more

Explicating the Concepts of Osquery

What is Osquery? Osquery is a universal system security monitoring and an intrusion tool which specially focuses on your operating system. Imagine a completely open-source tool which empowers you with monitoring the high-end file integrity by turning your operating...

read more
A New Approach to Accelerate Threat Detection

A New Approach to Accelerate Threat Detection

This article explains the importance of early threat detection and illustrates in detail about how a SIEM solution like Splunk can be useful in threat detection and incident response. SIEM is one of the several technologies that are used to detect...

read more

Threat Detection with SIGMA Rules

Incident Response is the action that you take to restore the ability to deliver organization business service. It is also known as IT incident, computer incident, or security incident. The main objective of the Incident Response is to handle the situation in a way...

read more
Source Integration with Anomali ThreatStream

Source Integration with Anomali ThreatStream

Loginsoft, a leading provider of cyber engineering services for Threat Intel Platform Companies has built the expertise in integrating with Anomali, a leading provider of intelligence-driven cybersecurity solutions. There are ever growing cyber product companies...

read more
Extending Splunk UI using Custom JS and CSS

Extending Splunk UI using Custom JS and CSS

Cyber Security companies are facing challenges to find reliable IT consulting firms to build dashboards quickly within popular SIEM products that will allow enterprise security professionals to track and record activities within their IT environments. Loginsoft has...

read more

Driving the Diligence of Data Visualization

Digital world revolves around the data and plays a vital role in each and every deciding factor. Presentation of such vital data logs, metrics and traces carry more weightage and demands everlasting attention in order to increase the efficiency of data visualization...

read more
Let us know how we can help you