Snort mailing list archives

Re: Snort Subscriber Rules Update 2017-03-21


From: "Joel Esler (jesler)" <jesler () cisco com>
Date: Tue, 21 Mar 2017 16:01:42 +0000

All of those people have been removed from the list.  Thanks Nathan for attempting to educate.

--
Joel Esler | Talos: Manager | jesler () cisco com<mailto:jesler () cisco com>






On Mar 21, 2017, at 10:33 AM, Hamer, Cyprille <cyprille.hamer () airbus com<mailto:cyprille.hamer () airbus com>> wrote:

ALREADY DONE WITHOUT SUCCESS => still receiving the e-mail.

-----Original Message-----
From: lists () packetmail net<mailto:lists () packetmail net> [mailto:lists () packetmail net]
Sent: Tuesday, March 21, 2017 3:09 PM
To: Snort-sigs () lists sourceforge net<mailto:Snort-sigs () lists sourceforge net>
Subject: Re: [Snort-sigs] FW: Snort Subscriber Rules Update 2017-03-21

You should remove yourselves via these methods below, which appear in the E-Mail
headers of the mailing list messages:

List-Unsubscribe: <https://lists.sourceforge.net/lists/listinfo/snort-sigs>,
<mailto:snort-sigs-request () lists sourceforge net?subject=unsubscribe>

On 03/21/17 08:52, ILLG, FREDERICK C wrote:
Please remove me as well.

Thanks again.

-Fred

-----Original Message-----
From: ted.r.tesoro () accenture com<mailto:ted.r.tesoro () accenture com> [mailto:ted.r.tesoro () accenture com]
Sent: Tuesday, March 21, 2017 9:48 AM
To: Snort-sigs () lists sourceforge net<mailto:Snort-sigs () lists sourceforge net>
Subject: [Snort-sigs] FW: Snort Subscriber Rules Update 2017-03-21

Hello,
Please remove me from the email distribution list. (ted.r.tesoro () accenture com<mailto:ted.r.tesoro () accenture com>)

Ted.

-----Original Message-----
From: Research [mailto:research () sourcefire com]
Sent: March 21, 2017 9:41 AM
To: snort-sigs () lists sourceforge net<mailto:snort-sigs () lists sourceforge net>
Subject: [Snort-sigs] Snort Subscriber Rules Update 2017-03-21


Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the blacklist, browser-ie, exploit-kit, file-flash, 
indicator-obfuscation, malware-cnc and server-webapp rule sets to provide coverage for emerging threats from these 
technologies.


For a complete list of new and modified rules please see:

https://www.snort.org/advisories


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org<http://Slashdot.org>! 
http://sdm.link/slashdot _______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net<mailto:Snort-sigs () lists sourceforge net>
https://lists.sourceforge.net/lists/listinfo/snort-sigs

http://www.snort.org

Please visit http://blog.snort.org for the latest news about Snort!

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!

________________________________

This message is for the designated recipient only and may contain privileged, proprietary, or otherwise confidential 
information. If you have received it in error, please notify the sender immediately and delete the original. Any other 
use of the e-mail by you is prohibited. Where allowed by local law, electronic communications with Accenture and its 
affiliates, including e-mail and instant messaging (including content), may be scanned by our systems for the purposes 
of information security and assessment of internal compliance with Accenture policy.
______________________________________________________________________________________

www.accenture.com

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs

http://www.snort.org

Please visit http://blog.snort.org for the latest news about Snort!

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs

http://www.snort.org

Please visit http://blog.snort.org for the latest news about Snort!

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!



------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org<http://slashdot.org/>! http://sdm.link/slashdot
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net<mailto:Snort-sigs () lists sourceforge net>
https://lists.sourceforge.net/lists/listinfo/snort-sigs

http://www.snort.org<http://www.snort.org/>

Please visit http://blog.snort.org<http://blog.snort.org/> for the latest news about Snort!

Visit the Snort.org<http://snort.org/> to subscribe to the official Snort ruleset, make sure to stay up to date to 
catch the most <a href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!

This mail has originated outside your organization, either from an external partner or the Global Internet.
Keep this in mind if you answer this message.




The information in this e-mail is confidential. The contents may not be disclosed or used by anyone other than the 
addressee. Access to this e-mail by anyone else is unauthorised.
If you are not the intended recipient, please notify Airbus immediately and delete this e-mail.
Airbus cannot accept any responsibility for the accuracy or completeness of this e-mail as it has been sent over public 
networks. If you have any concerns over the content of this message or its Accuracy or Integrity, please contact Airbus 
immediately.
All outgoing e-mails from Airbus are checked using regularly updated virus scanning software but you should take 
whatever measures you deem to be appropriate to ensure that this message and any attachments are virus free.


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org<http://slashdot.org/>! http://sdm.link/slashdot
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net<mailto:Snort-sigs () lists sourceforge net>
https://lists.sourceforge.net/lists/listinfo/snort-sigs

http://www.snort.org<http://www.snort.org/>

Please visit http://blog.snort.org<http://blog.snort.org/> for the latest news about Snort!

Visit the Snort.org<http://snort.org/> to subscribe to the official Snort ruleset, make sure to stay up to date to 
catch the most <a href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs

http://www.snort.org

Please visit http://blog.snort.org for the latest news about Snort!

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!

Current thread: