Man
Professional
- Messages
- 3,066
- Reaction score
- 596
- Points
- 113
Positive Technologies has launched an open-source project for proactive detection of cyberthreats.
Positive Technologies has launched PT Rules, an open-source project for the international community of information security (IS) specialists. The main goal of the project is to share the developed rules for detecting cyberattacks for the Suricata system and help identify the activity of intruders in a timely manner. The set of rules will be constantly updated, and the draft is available in English to reach out to the global community.
Experts from the PT Expert Security Center actively share their experience, creating various formats for the transfer of advanced knowledge in the field of cybersecurity. PT Rules has become another tool for the exchange of experience and the joint development of protection technologies. The company noted that cooperation with international colleagues plays a key role in a quick and effective response to cyber threats that can cause significant damage to both corporations and government agencies.
Recently, the PT Expert Security Center team posted on the PT Rules portal rules for detecting new vulnerabilities and tools popular among cybercriminals, as well as signatures for detecting movement inside the perimeter in the Active Directory directory service. To update the rules in a timely manner, experts recommend using the suricata-update utility, including the ptrules/open repository, which is included in the list of officially supported signature repositories.
Source
Positive Technologies has launched PT Rules, an open-source project for the international community of information security (IS) specialists. The main goal of the project is to share the developed rules for detecting cyberattacks for the Suricata system and help identify the activity of intruders in a timely manner. The set of rules will be constantly updated, and the draft is available in English to reach out to the global community.
Experts from the PT Expert Security Center actively share their experience, creating various formats for the transfer of advanced knowledge in the field of cybersecurity. PT Rules has become another tool for the exchange of experience and the joint development of protection technologies. The company noted that cooperation with international colleagues plays a key role in a quick and effective response to cyber threats that can cause significant damage to both corporations and government agencies.
Recently, the PT Expert Security Center team posted on the PT Rules portal rules for detecting new vulnerabilities and tools popular among cybercriminals, as well as signatures for detecting movement inside the perimeter in the Active Directory directory service. To update the rules in a timely manner, experts recommend using the suricata-update utility, including the ptrules/open repository, which is included in the list of officially supported signature repositories.
Source