Snort Subscriber Rule Set Update for 07/07/2015
We welcome the introduction of the newest rule release from Talos. In this release we introduced 30 new rules and made modifications to 4 additional rules.
There were no changes made to the
snort.confin this release.
Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:
Talos's rule release:
Adobe Flash Player Vulnerability: Adobe Flash Player suffers from programming errors that may lead to remote code execution. Rules to detect attacks targeting this vulnerability are included in this release and are identified with GID 1, SIDs 35086 through 35089.
iOS Lockdown Vulnerability: A programming error exists in iOS Lockdown service that may lead to remote code execution. Rules to detect attacks targeting this vulnerability are included in this release and are identified with GID 1, SIDs 35090 through 35091.
Talos has also added and modified multiple rules in the blacklist, browser-firefox, exploit-kit, file-flash, malware-cnc, os-mobile and server-webapp rule sets to provide coverage for emerging threats from these technologies.
In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats!