LoginsoftHandling Multiline Log formats using Regex and GROK ParserTo effectively analyze logs from multiple products, security operations teams must first comprehend the diverse landscape of log types.May 15May 15
LoginsoftSecuring the Software Supply Chain with Open Policy AgentIt is crucial to ensure that code changes are adequately reviewed and tested before being integrated into the main codebase.Jul 21, 2023Jul 21, 2023
LoginsoftLoginsoft Developed Datadog Cloud SIEM Integration for a Leading SOAR PlatformDatadog is a monitoring and observability platform that helps organizations collect, analyze, & visualize infrastructure & application…Jul 21, 2023Jul 21, 2023
LoginsoftEmpowering CI/CD with Rego PoliciesRego is a policy language used by the Open Policy Agent (OPA), a powerful policy enforcement engine. By integrating Rego OPA with CI/CD…Jul 20, 2023Jul 20, 2023
LoginsoftFortifying Cloud Security Posture Management with Open Policy Agent (OPA)Using OPA, organizations can define & enforce policies to govern various cloud resources like virtual machines, storage buckets &…Apr 5, 2023Apr 5, 2023
LoginsoftSecurity Products: Challenge, Accessibility & Approach to TestThis blog will cover the Deployment/Installing and Setting up Check Point firewall on a server Configuring and setting up a test network.Jan 19, 2023Jan 19, 2023
LoginsoftDiscock Stealer — Another Polymorphic Malware like WASP StealerWe first observed a package performing “starjacking” in the project https://github.com/pypa/sampleproject. We flagged the package for…Jan 13, 2023Jan 13, 2023
LoginsoftThreat Intelligence Connector for OpenCTI Cyber Threat Intelligence PlatformOpenCTI is an open source threat intelligence platform developed by Filigran in collaboration with French national cybersecurity…Dec 2, 2022Dec 2, 2022
LoginsoftOpen Vulnerability Assessment Language (OVAL) in a Nutshell Part-2This blog post is in continuation to our previous post titled Open Vulnerability Assessment Language in a Nutshell.Aug 27, 2022Aug 27, 2022
LoginsoftDetecting Atlassian Confluence Exploitation — CVE-2022–26134Context BackgroundJul 22, 2022Jul 22, 2022