threat-detection-rules icon indicating copy to clipboard operation
threat-detection-rules copied to clipboard

Threat Detection & Anomaly Detection rules for popular open-source components

Threat Detection Rules

Threat Detection & Anomaly Detection rules for popular open-source components. And some of the rules are of emerging threats which we observed in wild. Most of the rules were developed in Sigma format, you can find more information & community contributed rules here

This project is one of the projects that our Loginsoft Research & Innovation Unit is working on constantly to help organizations & contributing to the community. Our research is still in the experimental phase, the rules provided can be altered as per your need.

To learn how to use our rules on Anomaly Detection, have a look at our Documentation

For more information please have a look at our Blog Post

Interested in our research or have any suggestions, please reach our portal, we always hear you.