Snort
Securing the power grid: Are you ready for NERC CIP’s upcoming mandate?
3 min read
NERC has proposed a set of new cybersecurity requirements to ensure there is no gap in how power utilities secure their grid operations. Learn what they are and how Cisco can help you implement these new capabilities to drive compliance.
Determining the 10 most critical vulnerabilities on your network
4 min read
Learn how to take threat intelligence data available in Cisco Vulnerability Management and use it to uncover trends in Cisco Secure Firewall, uncovering new insights.
The myth of the long-tail vulnerability
6 min read
A long tail distribution of exploit attempts sounds reasonable. But is this how exploitation attempts really play out? Do attackers abandon exploits after a certain stage? To answer these questions, we’ll look at Snort data from Cisco Secure Firewall.
Threat Trends: Snort IPS
7 min read
In this ThreatWise TV episode we look at how Snort can be used to protect organizations, analyze Snort telemetry, and talk about what attackers often target.
Snort 3: Rearchitected for Simplicity and Performance
3 min read
Snort has become the standard by which all network intrusion detection systems are measured. Snort 3, released in January 2021 is a significant upgrade.
Microsoft Netlogon exploitation continues to rise
1 min read
Cisco Talos is tracking a spike in exploitation attempts against the Microsoft vulnerability CVE-2020-1472, an elevation of privilege bug in Netlogon, outlined in the August Microsoft Patch Tuesday report. The vulnerability stems from a flaw in a cryptographic authentication scheme used by the Netlogon Remote Protocol which — among other things — can be used […]
2018 in Snort Signatures
1 min read
The cybersecurity field shifted quite a bit in 2018. With the boom of cryptocurrency, we saw a transition from ransomware to cryptocurrency miners. Talos researchers identified APT campaigns including VPNFilter,...
Why we want users’ feedback on Snort rule documentation
1 min read
Today, Talos is launching a new community survey to solicit feedback on SNORTⓇ documentation. When Snort alerts the end user, the rule documentation is their first and possibly only avenue...
2017 in Snort Signatures.
1 min read
2017 was an eventful year for cyber security with high profile vulnerabilities that allowed self-replicating worm attacks such as WannaCry and BadRabbit to impact...