A new update has been released today for the Snort OpenAppID Detector content.
In this release, build 223, includes
- A total of 2,584 detectors.
- One fix that was also reported by the Open Source community about the getShortHostFormat call from our API.
Available now for download from our downloads page, we look forward to your downloading and using the new features of 2.9.7.0's OpenAppId preprocessor and sharing your experiences with the community.
The OpenAppId community has a mailing list specifically dedicated to the exchange and discussion of detector content. Please visit the mailing lists page to sign up.
Friday, October 31, 2014
Thursday, October 30, 2014
Snort Subscriber Rule Set Update for 10/30/2014
Just released:
Snort Subscriber Rule Set Update for 10/30/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 14 new rules and made modifications to 46 additional rules.
There were no changes made to the
Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:
Avery Tarasov
32367
Talos's rule release:
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Snort Subscriber Rule Set Update for 10/30/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 14 new rules and made modifications to 46 additional rules.
There were no changes made to the
snort.conf
in this release.
Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:
Avery Tarasov
32367
Talos's rule release:
The VRT has added and modified multiple rules in the browser-ie, browser-plugins, exploit-kit, file-flash, file-other, file-pdf, indicator-obfuscation, malware-cnc, os-other, os-windows, policy-other, protocol-nntp and protocol-scada rule sets to provide coverage for emerging threats from these technologies.
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Tuesday, October 28, 2014
Snort Subscriber Rule Set Update for 10/28/2014
Just released:
Snort Subscriber Rule Set Update for 10/28/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 13 new rules and made modifications to 44 additional rules.
There were no changes made to the
Talos's rule release:
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Snort Subscriber Rule Set Update for 10/28/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 13 new rules and made modifications to 44 additional rules.
There were no changes made to the
snort.conf
in this release.Talos's rule release:
The VRT has added and modified multiple rules in the browser-chrome, malware-cnc, server-other and sql rule sets to provide coverage for emerging threats from these technologies.
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Thursday, October 23, 2014
Snort Subscriber Rule Set Update for 10/23/2014, Release 2
Just released:
Snort Subscriber Rule Set Update for 10/23/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 29 new rules and made modifications to 16 additional rules.
There were no changes made to the
Talos's rule release:
Snort Subscriber Rule Set Update for 10/23/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 29 new rules and made modifications to 16 additional rules.
There were no changes made to the
snort.conf
in this release.Talos's rule release:
The VRT has added and modified multiple rules in the blacklist, browser-ie, file-other, file-pdf, malware-cnc, os-other, pua-adware, server-mail and server-webapp rule sets to provide coverage for emerging threats from these technologies.In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Snort EOL dates have been updated!
With the release of Snort 2.9.7.0, in accordance with our EOL policy, we've placed an EOL date on Snort version 2.9.5.6.
Please take a moment and review our EOL policy on our webpage, and review the 2.9.5.6 EOL date (January 21, 2015)
If there are any questions, please head on over to the Snort-users mailing list found on our Community Page.
Please take a moment and review our EOL policy on our webpage, and review the 2.9.5.6 EOL date (January 21, 2015)
If there are any questions, please head on over to the Snort-users mailing list found on our Community Page.
Snort Subscriber Rule Set Update for 10/23/2014, 2.9.7.0 Release
Just released:
Snort Subscriber Rule Set Update for 10/23/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 45 new rules and made modifications to 9 additional rules.
There were no changes made to the
Talos's rule release:
Snort Subscriber Rule Set Update for 10/23/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 45 new rules and made modifications to 9 additional rules.
There were no changes made to the
snort.conf
in this release.Talos's rule release:
The VRT has added and modified multiple rules in the blacklist, deleted, file-flash, file-multimedia, file-other, malware-cnc, os-mobile, protocol-snmp, server-oracle and server-webapp rule sets to provide coverage for emerging threats from these technologies.In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Snort 2.9.7.0 has been released!
Snort 2.9.7.0 is now available on snort.org at
http://www.snort.org/downloads in the Snort Stable Release section.
A new DAQ build is also available that updates support for a few
operating systems.
Snort 2.9.7.0 includes a major new feature for Application Identification, our OpenAppID capability.
In conjunction with this release, are shifting the license for the OpenAppId content to GPLv2 to encourage more use and submission back to Cisco. If you are interested in learning and writing OpenAppId content, please join us on the OpenAppId mailing list at https://www.snort.org/community. Any submissions to the OpenAppId ecosystem will receive public thanks and perhaps some nice swag!
2014-10-24 - Snort 2.9.7.0
[*] New additions
* Application Identification Preprocessor, when used in conjunction with
OpenAppID detector content, that will identify application protocol,
client, server, and web applications (including those using SSL) and
include the info in Snort alert data. In addition, a new rule option
keyword 'appid' that can be used to constrain Snort rules based on one
or more applications that are identified for the connection. Separate
prepackaged RPMs with App Open ID are available. See README.appid
for further details.
* A new protected_content rule option that is used to match against a
content that is hashed. It can be used to obscure the full context
of the rule from the administrator.
* Protocol Aware Flushing (PAF) improvements for SMTP, POP, and IMAP to
more accurately process different portions of email messages and file
attachments.
* Added ability to test normalization behavior without modifying
network traffic. When configured using na_policy_mode:inline-test,
statistics will be gathered on packet normalizations that would have
occurred, allowing less disruptive testing of inline deployments.
* The HTTP Inspection preprocessor now has the ability to decompress
DEFLATE and LZMA compressed flash content and DEFLATE compressed PDF
content from http responses when configured with the new
decompress_swf and decompress_pdf options. This enhancement can be
used with existing rule options that already match against
decompressed equivalents.
* Added improved XFF support to HttpInspect. It is now possible to
specify custom HTTP headers to use in place of 'X-Forwarded-For'. In
situations where traffic may contain multiple XFF-like headers, it is
possible to specify which headers hold precedence.
* Added additional support for Heartbleed detection within the SSL
preprocessor to improve performance.
* Added control socket command to dump packets to a file. See
README.snort_dump_packets_control for details.
* Added an option to suppress configuration information logging to
output.
* The Stream5 preprocessor functionality is now split between the new
Session and Stream6 preprocessors.
[*] Improvements
* Maximum IP6 extensions decoded is now configurable.
* Update active response to allow for responses of 1500+ bytes that span
multiple TCP packets.
* Check limits of multiple configurations to not exceed a maximum ID of
4095.
* Updated the error output of byte_test, byte_jump, byte_extract to
including details on offending options for a given rule.
* Update build and install scripts to install preprocessor and engine
libraries into user specified libdir.
* Improved performance of IP Reputation preprocessor.
* The control socket will now report success when reloading empty IP
Reputation whitelists/blacklists.
* All TCP normalizations can now be enabled individually. See
README.normalize for details on using the new options. For
consistency with other options, the "urp" tcp normalization keyword
now enables the normalization instead of disabling it.
* Lowered memory demand of Unicode -> ASCII mapping in HttpInspect.
* Updated profiler output to remove duplicate results when using
multiple configurations.
* Improved performance of FTP reassembly.
* Improved compatibility with Mac OSX 10.9 (Mavericks), OpenBSD,
FreeBSD, and DragonFlyBSD
http://www.snort.org/downloads in the Snort Stable Release section.
A new DAQ build is also available that updates support for a few
operating systems.
Snort 2.9.7.0 includes a major new feature for Application Identification, our OpenAppID capability.
In conjunction with this release, are shifting the license for the OpenAppId content to GPLv2 to encourage more use and submission back to Cisco. If you are interested in learning and writing OpenAppId content, please join us on the OpenAppId mailing list at https://www.snort.org/community. Any submissions to the OpenAppId ecosystem will receive public thanks and perhaps some nice swag!
2014-10-24 - Snort 2.9.7.0
[*] New additions
* Application Identification Preprocessor, when used in conjunction with
OpenAppID detector content, that will identify application protocol,
client, server, and web applications (including those using SSL) and
include the info in Snort alert data. In addition, a new rule option
keyword 'appid' that can be used to constrain Snort rules based on one
or more applications that are identified for the connection. Separate
prepackaged RPMs with App Open ID are available. See README.appid
for further details.
* A new protected_content rule option that is used to match against a
content that is hashed. It can be used to obscure the full context
of the rule from the administrator.
* Protocol Aware Flushing (PAF) improvements for SMTP, POP, and IMAP to
more accurately process different portions of email messages and file
attachments.
* Added ability to test normalization behavior without modifying
network traffic. When configured using na_policy_mode:inline-test,
statistics will be gathered on packet normalizations that would have
occurred, allowing less disruptive testing of inline deployments.
* The HTTP Inspection preprocessor now has the ability to decompress
DEFLATE and LZMA compressed flash content and DEFLATE compressed PDF
content from http responses when configured with the new
decompress_swf and decompress_pdf options. This enhancement can be
used with existing rule options that already match against
decompressed equivalents.
* Added improved XFF support to HttpInspect. It is now possible to
specify custom HTTP headers to use in place of 'X-Forwarded-For'. In
situations where traffic may contain multiple XFF-like headers, it is
possible to specify which headers hold precedence.
* Added additional support for Heartbleed detection within the SSL
preprocessor to improve performance.
* Added control socket command to dump packets to a file. See
README.snort_dump_packets_control for details.
* Added an option to suppress configuration information logging to
output.
* The Stream5 preprocessor functionality is now split between the new
Session and Stream6 preprocessors.
[*] Improvements
* Maximum IP6 extensions decoded is now configurable.
* Update active response to allow for responses of 1500+ bytes that span
multiple TCP packets.
* Check limits of multiple configurations to not exceed a maximum ID of
4095.
* Updated the error output of byte_test, byte_jump, byte_extract to
including details on offending options for a given rule.
* Update build and install scripts to install preprocessor and engine
libraries into user specified libdir.
* Improved performance of IP Reputation preprocessor.
* The control socket will now report success when reloading empty IP
Reputation whitelists/blacklists.
* All TCP normalizations can now be enabled individually. See
README.normalize for details on using the new options. For
consistency with other options, the "urp" tcp normalization keyword
now enables the normalization instead of disabling it.
* Lowered memory demand of Unicode -> ASCII mapping in HttpInspect.
* Updated profiler output to remove duplicate results when using
multiple configurations.
* Improved performance of FTP reassembly.
* Improved compatibility with Mac OSX 10.9 (Mavericks), OpenBSD,
FreeBSD, and DragonFlyBSD
Tuesday, October 21, 2014
Snort Subscriber Rule Set Update for 10/21/2014
Just released:
Snort Subscriber Rule Set Update for 10/21/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 27 new rules and made modifications to 8 additional rules.
There were no changes made to the
Talos's rule release:
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Snort Subscriber Rule Set Update for 10/21/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 27 new rules and made modifications to 8 additional rules.
There were no changes made to the
snort.conf
in this release.Talos's rule release:
The VRT has added and modified multiple rules in the blacklist, browser-firefox, browser-ie, file-identify, file-other, malware-backdoor, malware-cnc, malware-other, os-other, os-windows and server-webapp rule sets to provide coverage for emerging threats from these technologies.As a reminder: Snort 2.9.6.1 is now EOL, please update to 2.9.6.2.
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Thursday, October 16, 2014
Snort Subscriber Rule Set Update for 10/16/2014
Just released:
Snort Subscriber Rule Set Update for 10/16/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 22 new rules and made modifications to 15 additional rules.
There were no changes made to the
Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:
Avery Tarasov
32225
Talos's rule release:
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Snort Subscriber Rule Set Update for 10/16/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 22 new rules and made modifications to 15 additional rules.
There were no changes made to the
snort.conf
in this release.
Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:
Avery Tarasov
32225
Talos's rule release:
The VRT has added and modified multiple rules in the blacklist, browser-ie, file-flash, file-java, malware-cnc, protocol-ftp and server-other rule sets to provide coverage for emerging threats from these technologies.
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Wednesday, October 15, 2014
Snort Subscriber Rule Set Update for 10/15/2014
Just released:
Snort Subscriber Rule Set Update for 10/15/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 26 new rules and made modifications to 10 additional rules.
There were no changes made to the
Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:
Avery Tarasov
32196
Talos's rule release:
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Snort Subscriber Rule Set Update for 10/15/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 26 new rules and made modifications to 10 additional rules.
There were no changes made to the
snort.conf
in this release.
Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:
Avery Tarasov
32196
Talos's rule release:
The VRT has added and modified multiple rules in the blacklist, browser-ie, file-office, malware-cnc, os-windows, protocol-voip and server-webapp rule sets to provide coverage for emerging threats from these technologies.
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Tuesday, October 14, 2014
Snort Subscriber Rule Set Update for 10/14/2014, MSTuesday, Group 72 Coverage
Just released:
Snort Subscriber Rule Set Update for 10/14/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 56 new rules and made modifications to 9 additional rules.
There were no changes made to the
Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:
Avery Tarasov
32130
All detection related to our Group 72 coverage has also been released into the Community Ruleset for free: http://blogs.cisco.com/talos/threat-spotlight-group-72/
Talos's rule release:
For more details about these Microsoft vulnerabilities, please read our in-depth coverage post here:
http://blogs.cisco.com/talos/microsoft-tuesday-october-2014/
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Snort Subscriber Rule Set Update for 10/14/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 56 new rules and made modifications to 9 additional rules.
There were no changes made to the
snort.conf
in this release.
Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:
Avery Tarasov
32130
All detection related to our Group 72 coverage has also been released into the Community Ruleset for free: http://blogs.cisco.com/talos/threat-spotlight-group-72/
Talos's rule release:
Details:
Microsoft Security Bulletin MS14-056:
Microsoft Internet Explorer suffers from programming errors that may
lead to remote code execution.
Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 32137 through 32138,
32153 through 32164, 32166 through 32169 and 32182 through 32185.
Microsoft Security Bulletin MS14-057:
A coding deficiency exists in Microsoft .NET Framework that may lead to
remote code execution.
Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 32139 through 32140
and 32149 through 32152.
Microsoft Security Bulletin MS14-058:
A coding deficiency exists in a Microsoft Kernel-Mode driver that may
lead to remote code execution.
Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 32141 through 32146
and 32190 through 32191.
Microsoft Security Bulletin MS14-059:
A programing error in Microsoft ASP.NET MVC may lead to a security
feature bypass.
A previously released rule will detect attacks targeting this
vulnerability and has been updated with the appropriate reference
information. It is included in this release and is identified with GID
1, SID 7070.
Microsoft Security Bulletin MS14-061:
A coding deficiency exists in Microsoft Word and may lead to remote
code execution.
Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 32147 through 32148.
The VRT has added and modified multiple rules in the blacklist,
browser-ie, file-identify, file-office, file-other, file-pdf,
malware-backdoor, malware-cnc and policy-other rule sets to provide
coverage for emerging threats from these technologies.
For more details about these Microsoft vulnerabilities, please read our in-depth coverage post here:
http://blogs.cisco.com/talos/microsoft-tuesday-october-2014/
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Snort 2.9.6.1 EOL is October 15, 2014!
Snort 2.9.6.1 is now EOL for rule support.
This means we will no longer be releasing updates for this version of the rule engine. Users of this version are now encouraged to upgrade to the latest version of Snort, which is now Snort 2.9.6.2.
Please review our EOL policy here: https://www.snort.org/eol
This means we will no longer be releasing updates for this version of the rule engine. Users of this version are now encouraged to upgrade to the latest version of Snort, which is now Snort 2.9.6.2.
Please review our EOL policy here: https://www.snort.org/eol
Thursday, October 9, 2014
Snort Subscriber Rule Set Update for 10/09/2014
Just released:
Snort Subscriber Rule Set Update for 10/09/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 20 new rules and made modifications to 5 additional rules.
There were no changes made to the
Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:
Avery Tarasov
32130
Talos's rule release:
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Snort Subscriber Rule Set Update for 10/09/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 20 new rules and made modifications to 5 additional rules.
There were no changes made to the
snort.conf
in this release.
Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:
Avery Tarasov
32130
Talos's rule release:
The VRT has added and modified multiple rules in the blacklist, browser-firefox, file-identify, file-office, file-other, malware-cnc, pua-adware, server-mail and server-webapp rule sets to provide coverage for emerging threats from these technologies.
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Wednesday, October 8, 2014
Snort Subscriber Rule Set Update for 10/08/2014
Just released:
Snort Subscriber Rule Set Update for 10/08/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 18 new rules and made modifications to 10 additional rules.
There were no changes made to the
Talos's rule release:
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Snort Subscriber Rule Set Update for 10/08/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 18 new rules and made modifications to 10 additional rules.
There were no changes made to the
snort.conf
in this release.Talos's rule release:
The VRT has added and modified multiple rules in the browser-plugins, file-office, file-other, protocol-dns, server-mail and server-webapp rule sets to provide coverage for emerging threats from these technologies.
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Snort OpenAppID Detectors have been updated!
With Snort 2.9.7.0 RC's release, we've also posted updated Snort OpenAppID Detector content now available for download.
Available now for download from our downloads page, we look forward to your downloading and using the new features of 2.9.7.0's OpenAppId preprocessor and sharing your experiences with the community.
The OpenAppId community has a mailing list specifically dedicated to the exchange and discussion of detector content. Please visit the mailing lists page to sign up.
Available now for download from our downloads page, we look forward to your downloading and using the new features of 2.9.7.0's OpenAppId preprocessor and sharing your experiences with the community.
The OpenAppId community has a mailing list specifically dedicated to the exchange and discussion of detector content. Please visit the mailing lists page to sign up.
Labels:
2.9.7.0,
openappid,
release candidate,
snort
Tuesday, October 7, 2014
Snort Subscriber Rule Set Update for 10/07/2014
Just released:
Snort Subscriber Rule Set Update for 10/07/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 31 new rules and made modifications to 8 additional rules.
There were no changes made to the
Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:
Yaser Mansour
32072
32073
32074
Talos's rule release:
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Snort Subscriber Rule Set Update for 10/07/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 31 new rules and made modifications to 8 additional rules.
There were no changes made to the
snort.conf
in this release.
Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:
Yaser Mansour
32072
32073
32074
Talos's rule release:
The VRT has added and modified multiple rules in the blacklist, file-flash, file-office, file-other, malware-backdoor, malware-cnc, os-other and server-other rule sets to provide coverage for emerging threats from these technologies.
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Monday, October 6, 2014
DerbyCon OpenAppID Presentation
If you couldn't make it to DerbyCon this year you can still catch all the talks thanks to all the volunteers over at Iron Geek. This includes my talk on Open AppID. Check it out for an introduction to the latest in open source application detection we've added to Snort.
Friday, October 3, 2014
Installing and Configuring OpenFPC 0.9
Our very own Leon Ward here at Cisco has released a blog post detailing the Install and Configuration of OpenFPC 0.9 over on his blog.
Venture over there and have a look at the guide!
Labels:
Openfpc
Thursday, October 2, 2014
Snort Subscriber Rule Set Update for 10/02/2014
Just released:
Snort Subscriber Rule Set Update for 10/02/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 24 new rules and made modifications to 4 additional rules.
There were no changes made to the
Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:
Yaser Mansour
32065
32066
32067
Talos's rule release:
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Snort Subscriber Rule Set Update for 10/02/2014
We welcome the introduction of the newest rule release from Talos. In this release we introduced 24 new rules and made modifications to 4 additional rules.
There were no changes made to the
snort.conf
in this release.
Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:
Yaser Mansour
32065
32066
32067
Talos's rule release:
The VRT has added and modified multiple rules in the blacklist, file-office, file-pdf, malware-backdoor, malware-cnc, os-other and server-webapp rule sets to provide coverage for emerging threats from these technologies.
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!
Subscribe to:
Posts (Atom)