Thursday, April 23, 2015

Snort Subscriber Rule Set Update for 04/23/2015

Just released:
Snort Subscriber Rule Set Update for 04/23/2015


We welcome the introduction of the newest rule release from Talos. In this release we introduced 5 new rules and made modifications to 11 additional rules.

There were no changes made to the snort.conf in this release.



Talos's rule release:
Talos has added and modified multiple rules in the browser-ie, browser-other, exploit-kit, malware-cnc, pua-adware and server-webapp rule sets to provide coverage for emerging threats from these technologies.

In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!

Snort++ Update

Just pushed build 147 to github (snortadmin/snort3):

  • change data plugins (PT_DATA) to passive inspector plugins (IT_PASSIVE); supports named instances, reloads, and consumers



Tuesday, April 21, 2015

Snort Subscriber Rule Set Update for 04/21/2015

Just released:
Snort Subscriber Rule Set Update for 04/21/2015

We welcome the introduction of the newest rule release from Talos. In this release we introduced 44 new rules and made modifications to 5 additional rules.

There were no changes made to the snort.conf in this release.

Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:

Yaser Mansour
34137
34144
34145
34146

Talos's rule release:
Talos is aware of a vulnerability affecting products from Microsoft Corporation
and Adobe.

Details:
Microsoft Security Advisory:
A publicly exploited vulnerability exists in Adobe Flash Player affecting
Microsoft Windows versions prior to Windows 8.

Rules to detect attacks targeting these vulnerabilities are included in this
release and are identified with GID 1, SIDs 34178 through 34179.

Talos has added and modified multiple rules in the browser-ie, browser-other,
file-flash, file-pdf, malware-cnc, os-other, os-windows, pua-adware and
server-other rule sets to provide coverage for emerging threats from these
technologies.


In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!

Thursday, April 16, 2015

Snort Subscriber Rule Set Update for 04/16/2015

Just released:
Snort Subscriber Rule Set Update for 04/16/2015

We welcome the introduction of the newest rule release from Talos. In this release we introduced 33 new rules and made modifications to 22 additional rules.

There were no changes made to the snort.conf in this release.

Talos's rule release:
Talos has added and modified multiple rules in the blacklist, browser-firefox, browser-plugins, exploit-kit, file-flash, file-image, file-multimedia, file-office, file-other, indicator-obfuscation, malware-cnc, pua-adware and server-webapp rule sets to provide coverage for emerging threats from these technologies.

In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!

Snort++ Update

Just pushed build 146 to github (snortadmin/snort3):

  • added build of snort_manual.text if w3m is installed
  • added default_snort_manual.text w/o w3m
  • add Flow pointer to StreamSplitter::finish()

Wednesday, April 15, 2015

Talos has their own LinkedIn page now!

Just a quick note to let those of you interested in Talos and the goings on here, we now have a LinkedIn page available.

We're going to keep this packed with content from our outlets, blogs, and of course, our open Job postings.

Please feel free to head on over, join, and participate!

Tuesday, April 14, 2015

Snort Subscriber Rule Set Update for 04/14/2015, MSTuesday

Just released:
Snort Subscriber Rule Set Update for 04/14/2015


We welcome the introduction of the newest rule release from Talos. In this release we introduced 45 new rules and made modifications to 5 additional rules.

There were no changes made to the snort.conf in this release.

Talos's rule release:
Microsoft Security Bulletin MS15-032:
Microsoft Internet Explorer suffers from programming errors that may lead to
remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in this
release and are identified with GID 1, SIDs 32442 through 32443, 34059 through
34060, 34064 through 34065, 34068 through 34071, 34074 through 34077, 34084
through 34085, and 34089 through 34090.

Microsoft Security Bulletin MS15-033:
A coding deficiency exists in Microsoft Office that may lead to remote code
execution.

Rules to detect attacks targeting these vulnerabilities are included in this
release and are identified with GID 1, SIDs 34062 through 34063, 34066 through
34067, 34086 through 34087, and 34093 through 34094.

Microsoft Security Bulletin MS15-034:
A coding deficiency exists in Microsoft HTTP.sys that may lead to remote code
execution.

A rule to detect attacks targeting this vulnerability is included in this
release and is identified with GID 1, SID 34061.

Microsoft Security Bulletin MS15-035:
A coding deficiency exists in a Microsoft graphics component that may lead to
remode code execution.

Rules to detect attacks targeting these vulnerabilities are included in this
release and are identified with GID 1, SIDs 34082 through 34083.

Microsoft Security Bulletin MS15-036:
A coding deficiency exists in Microsoft SharePoint Server that that may lead to
an escalation of privilege.

Previously released rules will detect attacks targeting this vulnerability and
have been updated with the appropriate reference information. They are included
in this release and are identified with GID 1, SIDs 7070 and 21782.

A new rule to detect attacks targeting this vulnerability is also included in
this release and is identified with GID 1, SID 34099.

Microsoft Security Bulletin MS15-037:
A coding deficiency exists in Microsoft Windows Task Scheduler that that may
lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in this
release and are identified with GID 1, SIDs 34091 through 34092.

Microsoft Security Bulletin MS15-038:
A coding deficiency exists in Microsoft Windows that that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in this
release and are identified with GID 1, SIDs 34078 through 34081 and 34095
through 34096.

Microsoft Security Bulletin MS15-039:
A coding deficiency exists in Microsoft XML Core Services that may allow a
security feature bypass.

Rules to detect attacks targeting these vulnerabilities are included in this
release and are identified with GID 1, SIDs 34097 through 34098.

Microsoft Security Bulletin MS15-041:
A coding deficiency exists in Microsoft .NET Framework that may lead to
information disclosure.

A rule to detect attacks targeting this vulnerability is included in this
release and is identified with GID 1, SID 34088.


Talos has also added and modified multiple rules in the browser-ie, deleted,
exploit-kit, file-executable, file-office, file-other, indicator-obfuscation,
os-windows, policy-other and server-other rule sets to provide coverage for
emerging threats from these technologies.


In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!