88
I Use This!
High Activity

News

Analyzed about 1 hour ago. based on code collected about 1 hour ago.
Posted about 10 years ago by [email protected] (Russ Combs)
Just pushed build 148 to github (snortadmin/snort3):fixed default validation issue reported by Sancho Panzarefactored snort and snort_config modulesfile id refactoring and cleanupadded publish-subscribe handling of data eventsadded data_log plugin example for pub-sub
Posted over 10 years ago by [email protected] (Joel Esler)
Just released:Snort Subscriber Rule Set Update for 04/23/2015We welcome the introduction of the newest rule release from Talos. In this release we introduced 5 new rules and made modifications to 11 additional rules. There were no changes made to ... [More] the snort.conf in this release.Talos's rule release: Talos has added and modified multiple rules in the browser-ie, browser-other, exploit-kit, malware-cnc, pua-adware and server-webapp rule sets to provide coverage for emerging threats from these technologies.In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats! [Less]
Posted over 10 years ago by [email protected] (Russ Combs)
Just pushed build 147 to github (snortadmin/snort3):change data plugins (PT_DATA) to passive inspector plugins (IT_PASSIVE); supports named instances, reloads, and consumers
Posted over 10 years ago by [email protected] (Joel Esler)
Just released:Snort Subscriber Rule Set Update for 04/21/2015We welcome the introduction of the newest rule release from Talos. In this release we introduced 44 new rules and made modifications to 5 additional rules. There were no changes made to ... [More] the snort.conf in this release.Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:Yaser Mansour34137341443414534146Talos's rule release: Talos is aware of a vulnerability affecting products from Microsoft Corporationand Adobe.Details:Microsoft Security Advisory:A publicly exploited vulnerability exists in Adobe Flash Player affectingMicrosoft Windows versions prior to Windows 8.Rules to detect attacks targeting these vulnerabilities are included in thisrelease and are identified with GID 1, SIDs 34178 through 34179.Talos has added and modified multiple rules in the browser-ie, browser-other,file-flash, file-pdf, malware-cnc, os-other, os-windows, pua-adware andserver-other rule sets to provide coverage for emerging threats from thesetechnologies.In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats! [Less]
Posted over 10 years ago by [email protected] (Joel Esler)
Just released:Snort Subscriber Rule Set Update for 04/16/2015We welcome the introduction of the newest rule release from Talos. In this release we introduced 33 new rules and made modifications to 22 additional rules. There were no changes made to ... [More] the snort.conf in this release.Talos's rule release: Talos has added and modified multiple rules in the blacklist, browser-firefox, browser-plugins, exploit-kit, file-flash, file-image, file-multimedia, file-office, file-other, indicator-obfuscation, malware-cnc, pua-adware and server-webapp rule sets to provide coverage for emerging threats from these technologies.In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats! [Less]
Posted over 10 years ago by [email protected] (Russ Combs)
Just pushed build 146 to github (snortadmin/snort3):added build of snort_manual.text if w3m is installedadded default_snort_manual.text w/o w3madd Flow pointer to StreamSplitter::finish()
Posted over 10 years ago by [email protected] (Joel Esler)
Just a quick note to let those of you interested in Talos and the goings on here, we now have a LinkedIn page available.We're going to keep this packed with content from our outlets, blogs, and of course, our open Job postings. Please feel free to head on over, join, and participate!
Posted over 10 years ago by [email protected] (Joel Esler)
Just released:Snort Subscriber Rule Set Update for 04/14/2015We welcome the introduction of the newest rule release from Talos. In this release we introduced 45 new rules and made modifications to 5 additional rules. There were no changes made to ... [More] the snort.conf in this release.Talos's rule release: Microsoft Security Bulletin MS15-032:Microsoft Internet Explorer suffers from programming errors that may lead toremote code execution.Rules to detect attacks targeting these vulnerabilities are included in thisrelease and are identified with GID 1, SIDs 32442 through 32443, 34059 through34060, 34064 through 34065, 34068 through 34071, 34074 through 34077, 34084through 34085, and 34089 through 34090.Microsoft Security Bulletin MS15-033:A coding deficiency exists in Microsoft Office that may lead to remote codeexecution.Rules to detect attacks targeting these vulnerabilities are included in thisrelease and are identified with GID 1, SIDs 34062 through 34063, 34066 through34067, 34086 through 34087, and 34093 through 34094.Microsoft Security Bulletin MS15-034:A coding deficiency exists in Microsoft HTTP.sys that may lead to remote codeexecution.A rule to detect attacks targeting this vulnerability is included in thisrelease and is identified with GID 1, SID 34061.Microsoft Security Bulletin MS15-035:A coding deficiency exists in a Microsoft graphics component that may lead toremode code execution.Rules to detect attacks targeting these vulnerabilities are included in thisrelease and are identified with GID 1, SIDs 34082 through 34083.Microsoft Security Bulletin MS15-036:A coding deficiency exists in Microsoft SharePoint Server that that may lead toan escalation of privilege.Previously released rules will detect attacks targeting this vulnerability andhave been updated with the appropriate reference information. They are includedin this release and are identified with GID 1, SIDs 7070 and 21782.A new rule to detect attacks targeting this vulnerability is also included inthis release and is identified with GID 1, SID 34099.Microsoft Security Bulletin MS15-037:A coding deficiency exists in Microsoft Windows Task Scheduler that that maylead to an escalation of privilege.Rules to detect attacks targeting these vulnerabilities are included in thisrelease and are identified with GID 1, SIDs 34091 through 34092.Microsoft Security Bulletin MS15-038:A coding deficiency exists in Microsoft Windows that that may lead to anescalation of privilege.Rules to detect attacks targeting these vulnerabilities are included in thisrelease and are identified with GID 1, SIDs 34078 through 34081 and 34095through 34096.Microsoft Security Bulletin MS15-039:A coding deficiency exists in Microsoft XML Core Services that may allow asecurity feature bypass.Rules to detect attacks targeting these vulnerabilities are included in thisrelease and are identified with GID 1, SIDs 34097 through 34098.Microsoft Security Bulletin MS15-041:A coding deficiency exists in Microsoft .NET Framework that may lead toinformation disclosure.A rule to detect attacks targeting this vulnerability is included in thisrelease and is identified with GID 1, SID 34088.Talos has also added and modified multiple rules in the browser-ie, deleted,exploit-kit, file-executable, file-office, file-other, indicator-obfuscation,os-windows, policy-other and server-other rule sets to provide coverage foremerging threats from these technologies.In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats! [Less]
Posted over 10 years ago by [email protected] (Russ Combs)
Just pushed build 145 to github (snortadmin/snort3):abort PAF in current direction onlyadded StreamSplitter::finish()allow relative flush point of zeroadded Inspector::clear()new http refactoring and cleanupnew http changes - events from splitterfix dns assertion; remove unused variables
Posted over 10 years ago by [email protected] (Joel Esler)
Just released:Snort Subscriber Rule Set Update for 04/09/2015We welcome the introduction of the newest rule release from Talos. In this release we introduced 12 new rules and made modifications to 3 additional rules. There were no changes made to ... [More] the snort.conf in this release.Talos's rule release: Talos has added and modified multiple rules in the exploit-kit, file-other, malware-cnc, os-windows, protocol-dns, server-apache and server-webapp rule sets to provide coverage for emerging threats from these technologies. In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats! [Less]