Snort mailing list archives

Snort Subscriber Rules Update 2019-04-26


From: Research <research () sourcefire com>
Date: Fri, 26 Apr 2019 22:50:45 GMT

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Today Talos is making the first of a number of additions to the
max-detect policy to make it a heavily detection focused policy. As
such, performance will be impacted if this policy is enabled and it is
highly recommended that users test this policy's performance before
deploying it in production environments.

Talos has added and modified multiple rules in the app-detect,
browser-chrome, browser-firefox, browser-ie, browser-other,
browser-webkit, content-replace, exploit-kit, file-executable,
file-flash, file-identify, file-image, file-java, file-multimedia,
file-office, file-other, file-pdf, indicator-compromise,
indicator-obfuscation, indicator-scan, indicator-shellcode,
malware-backdoor, malware-cnc, malware-other, malware-tools, netbios,
os-linux, os-mobile, os-other, os-solaris, os-windows,
policy-multimedia, policy-other, policy-social, policy-spam,
protocol-dns, protocol-ftp, protocol-icmp, protocol-imap,
protocol-nntp, protocol-other, protocol-pop, protocol-rpc,
protocol-scada, protocol-services, protocol-snmp, protocol-telnet,
protocol-tftp, protocol-voip, pua-adware, pua-other, pua-p2p,
pua-toolbars, server-apache, server-iis, server-mail, server-mssql,
server-mysql, server-oracle, server-other and sql rule sets to provide
coverage for emerging threats from these technologies.


For a complete list of new and modified rules please see:

https://www.snort.org/advisories
-----BEGIN PGP SIGNATURE-----
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=i2/T
-----END PGP SIGNATURE-----

_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!


Current thread: