community.emergingthreats.net Open in urlscan Pro
2602:fd3f:3:ff02::4b  Public Scan

Submitted URL: https://t.co/T1gHmOFtql
Effective URL: https://community.emergingthreats.net/t/ruleset-update-summary-2024-10-10-v10718/2044
Submission: On November 11 via api from IN — Scanned from DE

Form analysis 1 forms found in the DOM

POST /login

<form id="hidden-login-form" method="post" action="/login" style="display: none;">
  <input name="username" type="text" id="signin_username">
  <input name="password" type="password" id="signin_password">
  <input name="redirect" type="hidden">
  <input type="submit" id="signin-button" value="Log In">
</form>

Text Content

Skip to main content

Sign Up Log In
 * 
 * 
   




RULESET UPDATE SUMMARY - 2024/10/10 - V10718

Ruleset Updates


You have selected 0 posts.

select all

cancel selecting


rulesbot
Oct 10



SUMMARY:

8 new OPEN, 9 new PRO (8 + 1)

Please be aware tomorrow, October 11th, is a Proofpoint company holiday. There
will not be a rule release that day. Rule releases will continue the following
Monday, October 14th.

--------------------------------------------------------------------------------


ADDED RULES:


OPEN:

 * 2056635 - ET HUNTING Suspected transformNode Obfuscation in XML document DOM
   (hunting.rules)
 * 2056636 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup
   (learnedwk .store) (malware.rules)
 * 2056637 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (learnedwk
   .store in TLS SNI) (malware.rules)
 * 2056638 - ET EXPLOIT_KIT ZPHP Domain in DNS Lookup (megaarmshop .com)
   (exploit_kit.rules)
 * 2056639 - ET EXPLOIT_KIT ZPHP Domain in TLS SNI (megaarmshop .com)
   (exploit_kit.rules)
 * 2056640 - ET WEB_SPECIFIC_APPS Palo Alto Expedition Unauthenticated Admin
   Password Reset (CVE-2024-5910) (web_specific_apps.rules)
 * 2056641 - ET WEB_SPECIFIC_APPS Palo Alto Expedition Authenticated Command
   Injection via Cronjobs (CVE-2024-9464) (web_specific_apps.rules)
 * 2056642 - ET WEB_SPECIFIC_APPS Palto Alto Expedition Unauthenticated SQL
   Injection in Checkpoint Config Parser (CVE-2024-9465)
   (web_specific_apps.rules)


PRO:

 * 2858667 - ETPRO EXPLOIT_KIT Evil Keitaro Set-Cookie Inbound to VexTrio
   (8f5db) (exploit_kit.rules)




96 views






Reply




RELATED TOPICS

Topic list, column headers with buttons are sortable. Topic Replies Views
Activity Ruleset Update Summary - 2024/07/30 - v10656
Ruleset Updates
0 101 Jul 30 Ruleset Update Summary - 2024/10/08 - v10716
Ruleset Updates
0 69 Oct 8 Ruleset Update Summary - 2024/07/31 - v10657
Ruleset Updates
0 94 Jul 31 Ruleset Update Summary - 2024/07/29 - v10655
Ruleset Updates
0 123 Jul 29 Ruleset Update Summary - 2024/10/09 - v10717
Ruleset Updates
0 70 Oct 9








Invalid date Invalid date