Snort mailing list archives

Sourcefire VRT Certified Snort Rules Update 2011-11-28


From: Research <research () sourcefire com>
Date: Mon, 28 Nov 2011 17:04:22 -0500 (EST)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Sourcefire VRT Certified Snort Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
The Sourcefire VRT has added and modified multiple rules in the
backdoor, bad-traffic, botnet-cnc, dns, exploit, file-identify, ftp,
icmp, imap, multimedia, netbios, pop3, scada, smtp, specific-threats
and web-misc rule sets to provide coverage for emerging threats from
these technologies.

For a complete list of new and modified rules please see:

http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2011-11-28.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFO1AVmaBoqZBVJfwMRAqgtAJ9z+bEVTLvj7bxBy2h0A04SNhDOyQCgkbN/
MetayKx0jZpvZqkeY08KQJI=
=mPJ8
-----END PGP SIGNATURE-----


------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure 
contains a definitive record of customers, application performance, 
security threats, fraudulent activity, and more. Splunk takes this 
data and makes sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-novd2d
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs
http://www.snort.org


Please visit http://blog.snort.org for the latest news about Snort!


Current thread: