Get a Pentest and security assessment of your IT network.

News

2017 in Snort Rules

2017 was an eventful year for cyber security with high profile vulnerabilities that allowed self-replicating worm attacks such as WannaCry and BadRabbit to impact organizations throughout the world. In this post we review some of the most frequently triggered Snort rules as reported by Cisco Meraki systems and included in the Snort default policy set. The most commonly reported class type of activity detected is Trojan-activity followed by Policy-violation and Misc-activity.”]

Source: https://blog.talosintelligence.com/2018/01/2017-in-snort-signatures.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

SEA has stolen invoices that shows Microsoft charges FBI for user data

News

Greek police arrested a man running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the Bitcoin