Snort mailing list archives

Snort Subscriber Rules Update 2018-01-04


From: Research <research () sourcefire com>
Date: Thu, 4 Jan 2018 15:00:25 GMT

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the browser-ie,
browser-other, browser-plugins, file-flash, file-image, file-java,
file-multimedia, file-other, indicator-compromise, malware-cnc,
policy-other, server-apache, server-oracle and server-webapp rule sets
to provide coverage for emerging threats from these technologies.


For a complete list of new and modified rules please see:

https://www.snort.org/advisories
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=zMzD
-----END PGP SIGNATURE-----

_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!


Current thread: