{
	"id": "d9d8afb4-0f01-46cc-bacf-2cb63780872f",
	"created_at": "2026-04-06T01:29:05.351378Z",
	"updated_at": "2026-04-10T13:12:52.351506Z",
	"deleted_at": null,
	"sha1_hash": "7d8e6af3f27d4790208576da5469d7ee973f59bd",
	"title": "Research As A Service | Loginsoft",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 582839,
	"plain_text": "Research As A Service | Loginsoft\r\nArchived: 2026-04-06 01:23:07 UTC\r\nhttps://research.loginsoft.com/threat-research/from-innocence-to-malice-the-onenote-malware-campaign-uncovered/\r\nPage 1 of 7\n\nhttps://research.loginsoft.com/threat-research/from-innocence-to-malice-the-onenote-malware-campaign-uncovered/\r\nPage 2 of 7\n\nWho we are\r\nWe're more than just experts in cybersecurity; we're your accredited in-house research team focused on unraveling\r\nthe complexities of cybersecurity and future technologies.\r\nFrom Application Security to Threat Research, our team of seasoned professionals have cultivated expertise in\r\nevery facet of the field. We understand that conducting comprehensive research and analysis to produce high-https://research.loginsoft.com/threat-research/from-innocence-to-malice-the-onenote-malware-campaign-uncovered/\r\nPage 3 of 7\n\nquality deliverables requires a unique blend of skills and training in niche subjects.\r\nOur team is comprised of industry-certified experts who stay ahead of emerging threats and technologies.\r\nWe've earned the trust of over 20 security products and companies relying on our research and analysis to\r\nstrengthen their cybersecurity solutions.\r\nWe bring a global perspective to every project. Our team spans across various demographic locations in India, the\r\nUSA, and Canada.\r\nWe have partnered with reputed universities to elevate our research, ensuring our clients receive cutting-edge\r\ninsights and solutions.\r\nCloud Security\r\nCrafted Rego policies to improve Cloud Security Posture Management (CSPM)\r\nSCA\r\nConducted in-depth research and analysis on over 40,000 CVE as a part of Software Composition Analysis\r\nDependency Defense\r\nExamined over 80,000 open-source software libraries to detect malicious packages and libraries\r\nZero-Day Discovery\r\nUncovered more than 2,500 zero-day vulnerabilities in open-source software (OSS) ecosystems\r\nhttps://research.loginsoft.com/threat-research/from-innocence-to-malice-the-onenote-malware-campaign-uncovered/\r\nPage 4 of 7\n\nVulnerability Management\r\nDeveloped OVAL definitions over 15,000 CVEs to enhance Vulnerability Management Products\r\nAttack Surface Management\r\nCreated digital fingerprints to identify vulnerable assets on the Internet\r\nThreat Intelligence\r\nMonitored more than 120 ransomware groups and over 100 threat actors to map with ATT\u0026CK techniques\r\nThreat Research\r\nInvestigated over 8,000 malevolent Chrome Extensions\r\nThreat Detection \u0026 Engineering\r\nCreated threat detections across multiple formats, including Sigma, Yara, Semgrep, OVAL, Falco, Osquery, and\r\nRego, covering areas like Application Security, Endpoint Security, and Container Security.\r\nBudget-Friendly\r\nBudgetary constraints. Our cost-effective \"Research-as-a-Service\" is your key to high-quality research without\r\nbreaking the bank.\r\nhttps://research.loginsoft.com/threat-research/from-innocence-to-malice-the-onenote-malware-campaign-uncovered/\r\nPage 5 of 7\n\nDiverse Experience\r\nWe're equipped to tackle a wide range of research projects. Cybersecurity isn't one-size-fits-all. Our team boasts\r\ndiverse expertise, ensuring that we solve the most complex problems.\r\nRetention Revolution\r\nLooking into researcher turnover, we offer a unique solution to keep your projects aligned without the headache of\r\nconstant recruitment.\r\nAlways Ready\r\nCyber threats don't sleep, and neither do we. Our global team spans time zones to provide support whenever you\r\nneed it.\r\nSkill Scarcity\r\nOur Research-as-a-Service swiftly connects you with our certified security experts.\r\n0\r\n+\r\nCybersecurity Researchers\r\n0\r\n%\r\nROI Assured\r\n0\r\nhttps://research.loginsoft.com/threat-research/from-innocence-to-malice-the-onenote-malware-campaign-uncovered/\r\nPage 6 of 7\n\n+\r\nYears of Service Offering\r\n0\r\n+\r\nSecurity Platforms Exposure\r\n0\r\n+\r\nTop Security Products Trust Us\r\nSource: https://research.loginsoft.com/threat-research/from-innocence-to-malice-the-onenote-malware-campaign-uncovered/\r\nhttps://research.loginsoft.com/threat-research/from-innocence-to-malice-the-onenote-malware-campaign-uncovered/\r\nPage 7 of 7",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://research.loginsoft.com/threat-research/from-innocence-to-malice-the-onenote-malware-campaign-uncovered/"
	],
	"report_names": [
		"from-innocence-to-malice-the-onenote-malware-campaign-uncovered"
	],
	"threat_actors": [],
	"ts_created_at": 1775438945,
	"ts_updated_at": 1775826772,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/7d8e6af3f27d4790208576da5469d7ee973f59bd.pdf",
		"text": "https://archive.orkl.eu/7d8e6af3f27d4790208576da5469d7ee973f59bd.txt",
		"img": "https://archive.orkl.eu/7d8e6af3f27d4790208576da5469d7ee973f59bd.jpg"
	}
}