Just released:
Snort Subscriber Rule Set Update for Nov. 20, 2018
Today, Cisco Talos released the newest SNORTⓇ rule update. In this release, we introduced eight new rules, two of which are shared object rules. There are also 51 modified rules, none of which are shared object rules.
This update covers a variety of malware, including a new variant of the Olympic Destroyer malware spotted in the wild, as well as the Zebrocy trojan that Russian-backed hackers appear to be using against U.S. users.
There were no changes made to the
Talos's rule release:
Snort Subscriber Rule Set Update for Nov. 20, 2018
Today, Cisco Talos released the newest SNORTⓇ rule update. In this release, we introduced eight new rules, two of which are shared object rules. There are also 51 modified rules, none of which are shared object rules.
This update covers a variety of malware, including a new variant of the Olympic Destroyer malware spotted in the wild, as well as the Zebrocy trojan that Russian-backed hackers appear to be using against U.S. users.
There were no changes made to the
snort.conf
in this release.Talos's rule release:
Talos has added and modified multiple rules in the browser-ie, file-flash, file-office, file-other, malware-cnc and server-webapp rule sets to provide coverage for emerging threats from these technologies.You can subscribe to Talos' newest rule detection functionality for as low as $29 a year with a personal account. Be sure and see our business pricing as well here. Make sure and stay up to date to catch the most emerging threats.