Talos Rules 2026-03-24
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the file-image, malware-cnc, malware-other and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2026-03-24 13:10:03 UTC

Snort Subscriber Rules Update

Date: 2026-03-24

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:66154 <-> DISABLED <-> SERVER-WEBAPP SolarWinds Orion Platform insecure deserialization attempt (server-webapp.rules)
 * 1:66155 <-> DISABLED <-> SERVER-WEBAPP Inductive Automation Ignition insecure deserialization attempt (server-webapp.rules)
 * 1:66156 <-> DISABLED <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt (server-webapp.rules)
 * 1:66157 <-> DISABLED <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt (server-webapp.rules)
 * 1:66158 <-> DISABLED <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt (server-webapp.rules)
 * 1:66159 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66160 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66161 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66162 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66163 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66164 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66165 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66166 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66167 <-> ENABLED <-> MALWARE-CNC Win.InfoStealer.Salat variant outbound communication (malware-cnc.rules)
 * 1:66168 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt (malware-other.rules)
 * 1:66169 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt (malware-other.rules)
 * 1:66170 <-> ENABLED <-> MALWARE-CNC Win.InfoStealer.XWorm variant outbound communication (malware-cnc.rules)
 * 1:66171 <-> ENABLED <-> MALWARE-CNC Win.InfoStealer.Quasar variant outbound communication (malware-cnc.rules)
 * 1:66172 <-> ENABLED <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication (malware-cnc.rules)
 * 1:66173 <-> ENABLED <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication (malware-cnc.rules)
 * 1:66174 <-> ENABLED <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication (malware-cnc.rules)
 * 3:66176 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt (file-image.rules)
 * 3:66175 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt (file-image.rules)
 * 3:66178 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt (file-image.rules)
 * 3:66177 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt (file-image.rules)

Modified Rules:


 * 1:65876 <-> DISABLED <-> POLICY-OTHER AnomalyCo OpenCode command execution attempt (policy-other.rules)
 * 1:65619 <-> ENABLED <-> SERVER-WEBAPP Fortinet FortiWeb SSO authentication bypass attempt (server-webapp.rules)

2026-03-24 13:10:03 UTC

Snort Subscriber Rules Update

Date: 2026-03-24

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:66169 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt (malware-other.rules)
 * 1:66170 <-> ENABLED <-> MALWARE-CNC Win.InfoStealer.XWorm variant outbound communication (malware-cnc.rules)
 * 1:66158 <-> DISABLED <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt (server-webapp.rules)
 * 1:66156 <-> DISABLED <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt (server-webapp.rules)
 * 1:66162 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66163 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66164 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66165 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66166 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66167 <-> ENABLED <-> MALWARE-CNC Win.InfoStealer.Salat variant outbound communication (malware-cnc.rules)
 * 1:66168 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt (malware-other.rules)
 * 1:66171 <-> ENABLED <-> MALWARE-CNC Win.InfoStealer.Quasar variant outbound communication (malware-cnc.rules)
 * 1:66172 <-> ENABLED <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication (malware-cnc.rules)
 * 1:66173 <-> ENABLED <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication (malware-cnc.rules)
 * 1:66155 <-> DISABLED <-> SERVER-WEBAPP Inductive Automation Ignition insecure deserialization attempt (server-webapp.rules)
 * 1:66174 <-> ENABLED <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication (malware-cnc.rules)
 * 1:66157 <-> DISABLED <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt (server-webapp.rules)
 * 1:66154 <-> DISABLED <-> SERVER-WEBAPP SolarWinds Orion Platform insecure deserialization attempt (server-webapp.rules)
 * 1:66160 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66159 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66161 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 3:66176 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt (file-image.rules)
 * 3:66175 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt (file-image.rules)
 * 3:66178 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt (file-image.rules)
 * 3:66177 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt (file-image.rules)

Modified Rules:


 * 1:65876 <-> DISABLED <-> POLICY-OTHER AnomalyCo OpenCode command execution attempt (policy-other.rules)
 * 1:65619 <-> ENABLED <-> SERVER-WEBAPP Fortinet FortiWeb SSO authentication bypass attempt (server-webapp.rules)

2026-03-24 13:10:03 UTC

Snort Subscriber Rules Update

Date: 2026-03-24

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:66169 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt (malware-other.rules)
 * 1:66170 <-> ENABLED <-> MALWARE-CNC Win.InfoStealer.XWorm variant outbound communication (malware-cnc.rules)
 * 1:66155 <-> DISABLED <-> SERVER-WEBAPP Inductive Automation Ignition insecure deserialization attempt (server-webapp.rules)
 * 1:66159 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66171 <-> ENABLED <-> MALWARE-CNC Win.InfoStealer.Quasar variant outbound communication (malware-cnc.rules)
 * 1:66172 <-> ENABLED <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication (malware-cnc.rules)
 * 1:66173 <-> ENABLED <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication (malware-cnc.rules)
 * 1:66174 <-> ENABLED <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication (malware-cnc.rules)
 * 1:66157 <-> DISABLED <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt (server-webapp.rules)
 * 1:66158 <-> DISABLED <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt (server-webapp.rules)
 * 1:66160 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66162 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66163 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66164 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66154 <-> DISABLED <-> SERVER-WEBAPP SolarWinds Orion Platform insecure deserialization attempt (server-webapp.rules)
 * 1:66156 <-> DISABLED <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt (server-webapp.rules)
 * 1:66161 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66165 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66166 <-> DISABLED <-> SERVER-WEBAPP Advantech iView command injection attempt (server-webapp.rules)
 * 1:66167 <-> ENABLED <-> MALWARE-CNC Win.InfoStealer.Salat variant outbound communication (malware-cnc.rules)
 * 1:66168 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt (malware-other.rules)
 * 3:66175 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt (file-image.rules)
 * 3:66176 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt (file-image.rules)
 * 3:66177 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt (file-image.rules)
 * 3:66178 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt (file-image.rules)

Modified Rules:


 * 1:65876 <-> DISABLED <-> POLICY-OTHER AnomalyCo OpenCode command execution attempt (policy-other.rules)
 * 1:65619 <-> ENABLED <-> SERVER-WEBAPP Fortinet FortiWeb SSO authentication bypass attempt (server-webapp.rules)

2026-03-24 13:12:38 UTC

Snort Subscriber Rules Update

Date: 2026-03-23-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.2.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301454 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:301455 <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt
* 1:66154 <-> SERVER-WEBAPP SolarWinds Orion Platform insecure deserialization attempt
* 1:66155 <-> SERVER-WEBAPP Inductive Automation Ignition insecure deserialization attempt
* 1:66156 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:66159 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66160 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66161 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66162 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66163 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66164 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66165 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66166 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66167 <-> MALWARE-CNC Win.InfoStealer.Salat variant outbound communication
* 1:66170 <-> MALWARE-CNC Win.InfoStealer.XWorm variant outbound communication
* 1:66171 <-> MALWARE-CNC Win.InfoStealer.Quasar variant outbound communication
* 1:66172 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66173 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66174 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 3:66175 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66176 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66177 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66178 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt

Modified Rules:

* 1:65619 <-> SERVER-WEBAPP Fortinet FortiWeb SSO authentication bypass attempt
* 1:65876 <-> POLICY-OTHER AnomalyCo OpenCode command execution attempt


2026-03-24 13:12:38 UTC

Snort Subscriber Rules Update

Date: 2026-03-23-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.5.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301454 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:301455 <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt
* 1:66154 <-> SERVER-WEBAPP SolarWinds Orion Platform insecure deserialization attempt
* 1:66155 <-> SERVER-WEBAPP Inductive Automation Ignition insecure deserialization attempt
* 1:66156 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:66159 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66160 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66161 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66162 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66163 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66164 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66165 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66166 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66167 <-> MALWARE-CNC Win.InfoStealer.Salat variant outbound communication
* 1:66170 <-> MALWARE-CNC Win.InfoStealer.XWorm variant outbound communication
* 1:66171 <-> MALWARE-CNC Win.InfoStealer.Quasar variant outbound communication
* 1:66172 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66173 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66174 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 3:66175 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66176 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66177 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66178 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt

Modified Rules:

* 1:65619 <-> SERVER-WEBAPP Fortinet FortiWeb SSO authentication bypass attempt
* 1:65876 <-> POLICY-OTHER AnomalyCo OpenCode command execution attempt


2026-03-24 13:12:39 UTC

Snort Subscriber Rules Update

Date: 2026-03-23-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.6.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301454 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:301455 <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt
* 1:66154 <-> SERVER-WEBAPP SolarWinds Orion Platform insecure deserialization attempt
* 1:66155 <-> SERVER-WEBAPP Inductive Automation Ignition insecure deserialization attempt
* 1:66156 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:66159 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66160 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66161 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66162 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66163 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66164 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66165 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66166 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66167 <-> MALWARE-CNC Win.InfoStealer.Salat variant outbound communication
* 1:66170 <-> MALWARE-CNC Win.InfoStealer.XWorm variant outbound communication
* 1:66171 <-> MALWARE-CNC Win.InfoStealer.Quasar variant outbound communication
* 1:66172 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66173 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66174 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 3:66175 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66176 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66177 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66178 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt

Modified Rules:

* 1:65619 <-> SERVER-WEBAPP Fortinet FortiWeb SSO authentication bypass attempt
* 1:65876 <-> POLICY-OTHER AnomalyCo OpenCode command execution attempt


2026-03-24 13:12:39 UTC

Snort Subscriber Rules Update

Date: 2026-03-23-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301454 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:301455 <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt
* 1:66154 <-> SERVER-WEBAPP SolarWinds Orion Platform insecure deserialization attempt
* 1:66155 <-> SERVER-WEBAPP Inductive Automation Ignition insecure deserialization attempt
* 1:66156 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:66159 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66160 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66161 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66162 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66163 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66164 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66165 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66166 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66167 <-> MALWARE-CNC Win.InfoStealer.Salat variant outbound communication
* 1:66170 <-> MALWARE-CNC Win.InfoStealer.XWorm variant outbound communication
* 1:66171 <-> MALWARE-CNC Win.InfoStealer.Quasar variant outbound communication
* 1:66172 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66173 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66174 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 3:66175 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66176 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66177 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66178 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt

Modified Rules:

* 1:65619 <-> SERVER-WEBAPP Fortinet FortiWeb SSO authentication bypass attempt
* 1:65876 <-> POLICY-OTHER AnomalyCo OpenCode command execution attempt


2026-03-24 13:12:39 UTC

Snort Subscriber Rules Update

Date: 2026-03-23-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.7.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301454 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:301455 <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt
* 1:66154 <-> SERVER-WEBAPP SolarWinds Orion Platform insecure deserialization attempt
* 1:66155 <-> SERVER-WEBAPP Inductive Automation Ignition insecure deserialization attempt
* 1:66156 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:66159 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66160 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66161 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66162 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66163 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66164 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66165 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66166 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66167 <-> MALWARE-CNC Win.InfoStealer.Salat variant outbound communication
* 1:66170 <-> MALWARE-CNC Win.InfoStealer.XWorm variant outbound communication
* 1:66171 <-> MALWARE-CNC Win.InfoStealer.Quasar variant outbound communication
* 1:66172 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66173 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66174 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 3:66175 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66176 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66177 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66178 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt

Modified Rules:

* 1:65619 <-> SERVER-WEBAPP Fortinet FortiWeb SSO authentication bypass attempt
* 1:65876 <-> POLICY-OTHER AnomalyCo OpenCode command execution attempt


2026-03-24 13:12:39 UTC

Snort Subscriber Rules Update

Date: 2026-03-23-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.9.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301454 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:301455 <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt
* 1:66154 <-> SERVER-WEBAPP SolarWinds Orion Platform insecure deserialization attempt
* 1:66155 <-> SERVER-WEBAPP Inductive Automation Ignition insecure deserialization attempt
* 1:66156 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:66159 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66160 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66161 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66162 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66163 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66164 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66165 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66166 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66167 <-> MALWARE-CNC Win.InfoStealer.Salat variant outbound communication
* 1:66170 <-> MALWARE-CNC Win.InfoStealer.XWorm variant outbound communication
* 1:66171 <-> MALWARE-CNC Win.InfoStealer.Quasar variant outbound communication
* 1:66172 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66173 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66174 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 3:66175 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66176 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66177 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66178 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt

Modified Rules:

* 1:65619 <-> SERVER-WEBAPP Fortinet FortiWeb SSO authentication bypass attempt
* 1:65876 <-> POLICY-OTHER AnomalyCo OpenCode command execution attempt


2026-03-24 13:12:39 UTC

Snort Subscriber Rules Update

Date: 2026-03-23-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301454 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:301455 <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt
* 1:66154 <-> SERVER-WEBAPP SolarWinds Orion Platform insecure deserialization attempt
* 1:66155 <-> SERVER-WEBAPP Inductive Automation Ignition insecure deserialization attempt
* 1:66156 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:66159 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66160 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66161 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66162 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66163 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66164 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66165 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66166 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66167 <-> MALWARE-CNC Win.InfoStealer.Salat variant outbound communication
* 1:66170 <-> MALWARE-CNC Win.InfoStealer.XWorm variant outbound communication
* 1:66171 <-> MALWARE-CNC Win.InfoStealer.Quasar variant outbound communication
* 1:66172 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66173 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66174 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 3:66175 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66176 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66177 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66178 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt

Modified Rules:

* 1:65619 <-> SERVER-WEBAPP Fortinet FortiWeb SSO authentication bypass attempt
* 1:65876 <-> POLICY-OTHER AnomalyCo OpenCode command execution attempt


2026-03-24 13:12:39 UTC

Snort Subscriber Rules Update

Date: 2026-03-23-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301454 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:301455 <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt
* 1:66154 <-> SERVER-WEBAPP SolarWinds Orion Platform insecure deserialization attempt
* 1:66155 <-> SERVER-WEBAPP Inductive Automation Ignition insecure deserialization attempt
* 1:66156 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:66159 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66160 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66161 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66162 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66163 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66164 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66165 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66166 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66167 <-> MALWARE-CNC Win.InfoStealer.Salat variant outbound communication
* 1:66170 <-> MALWARE-CNC Win.InfoStealer.XWorm variant outbound communication
* 1:66171 <-> MALWARE-CNC Win.InfoStealer.Quasar variant outbound communication
* 1:66172 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66173 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66174 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 3:66175 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66176 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66177 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66178 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt

Modified Rules:

* 1:65619 <-> SERVER-WEBAPP Fortinet FortiWeb SSO authentication bypass attempt
* 1:65876 <-> POLICY-OTHER AnomalyCo OpenCode command execution attempt


2026-03-24 13:12:39 UTC

Snort Subscriber Rules Update

Date: 2026-03-23-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301454 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:301455 <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt
* 1:66154 <-> SERVER-WEBAPP SolarWinds Orion Platform insecure deserialization attempt
* 1:66155 <-> SERVER-WEBAPP Inductive Automation Ignition insecure deserialization attempt
* 1:66156 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:66159 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66160 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66161 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66162 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66163 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66164 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66165 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66166 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66167 <-> MALWARE-CNC Win.InfoStealer.Salat variant outbound communication
* 1:66170 <-> MALWARE-CNC Win.InfoStealer.XWorm variant outbound communication
* 1:66171 <-> MALWARE-CNC Win.InfoStealer.Quasar variant outbound communication
* 1:66172 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66173 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66174 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 3:66175 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66176 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66177 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66178 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt

Modified Rules:

* 1:65619 <-> SERVER-WEBAPP Fortinet FortiWeb SSO authentication bypass attempt
* 1:65876 <-> POLICY-OTHER AnomalyCo OpenCode command execution attempt


2026-03-24 13:12:39 UTC

Snort Subscriber Rules Update

Date: 2026-03-23-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.12.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301454 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:301455 <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt
* 1:66154 <-> SERVER-WEBAPP SolarWinds Orion Platform insecure deserialization attempt
* 1:66155 <-> SERVER-WEBAPP Inductive Automation Ignition insecure deserialization attempt
* 1:66156 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:66159 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66160 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66161 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66162 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66163 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66164 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66165 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66166 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66167 <-> MALWARE-CNC Win.InfoStealer.Salat variant outbound communication
* 1:66170 <-> MALWARE-CNC Win.InfoStealer.XWorm variant outbound communication
* 1:66171 <-> MALWARE-CNC Win.InfoStealer.Quasar variant outbound communication
* 1:66172 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66173 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66174 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 3:66175 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66176 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66177 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66178 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt

Modified Rules:

* 1:65619 <-> SERVER-WEBAPP Fortinet FortiWeb SSO authentication bypass attempt
* 1:65876 <-> POLICY-OTHER AnomalyCo OpenCode command execution attempt


2026-03-24 13:12:39 UTC

Snort Subscriber Rules Update

Date: 2026-03-23-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301454 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:301455 <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt
* 1:66154 <-> SERVER-WEBAPP SolarWinds Orion Platform insecure deserialization attempt
* 1:66155 <-> SERVER-WEBAPP Inductive Automation Ignition insecure deserialization attempt
* 1:66156 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:66159 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66160 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66161 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66162 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66163 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66164 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66165 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66166 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66167 <-> MALWARE-CNC Win.InfoStealer.Salat variant outbound communication
* 1:66170 <-> MALWARE-CNC Win.InfoStealer.XWorm variant outbound communication
* 1:66171 <-> MALWARE-CNC Win.InfoStealer.Quasar variant outbound communication
* 1:66172 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66173 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66174 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 3:66175 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66176 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66177 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66178 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt

Modified Rules:

* 1:65619 <-> SERVER-WEBAPP Fortinet FortiWeb SSO authentication bypass attempt
* 1:65876 <-> POLICY-OTHER AnomalyCo OpenCode command execution attempt


2026-03-24 13:12:39 UTC

Snort Subscriber Rules Update

Date: 2026-03-23-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301454 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:301455 <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt
* 1:66154 <-> SERVER-WEBAPP SolarWinds Orion Platform insecure deserialization attempt
* 1:66155 <-> SERVER-WEBAPP Inductive Automation Ignition insecure deserialization attempt
* 1:66156 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:66159 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66160 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66161 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66162 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66163 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66164 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66165 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66166 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66167 <-> MALWARE-CNC Win.InfoStealer.Salat variant outbound communication
* 1:66170 <-> MALWARE-CNC Win.InfoStealer.XWorm variant outbound communication
* 1:66171 <-> MALWARE-CNC Win.InfoStealer.Quasar variant outbound communication
* 1:66172 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66173 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66174 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 3:66175 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66176 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66177 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66178 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt

Modified Rules:

* 1:65619 <-> SERVER-WEBAPP Fortinet FortiWeb SSO authentication bypass attempt
* 1:65876 <-> POLICY-OTHER AnomalyCo OpenCode command execution attempt


2026-03-24 13:12:39 UTC

Snort Subscriber Rules Update

Date: 2026-03-23-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301454 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:301455 <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt
* 1:66154 <-> SERVER-WEBAPP SolarWinds Orion Platform insecure deserialization attempt
* 1:66155 <-> SERVER-WEBAPP Inductive Automation Ignition insecure deserialization attempt
* 1:66156 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:66159 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66160 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66161 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66162 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66163 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66164 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66165 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66166 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66167 <-> MALWARE-CNC Win.InfoStealer.Salat variant outbound communication
* 1:66170 <-> MALWARE-CNC Win.InfoStealer.XWorm variant outbound communication
* 1:66171 <-> MALWARE-CNC Win.InfoStealer.Quasar variant outbound communication
* 1:66172 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66173 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66174 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 3:66175 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66176 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66177 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66178 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt

Modified Rules:

* 1:65619 <-> SERVER-WEBAPP Fortinet FortiWeb SSO authentication bypass attempt
* 1:65876 <-> POLICY-OTHER AnomalyCo OpenCode command execution attempt


2026-03-24 13:12:39 UTC

Snort Subscriber Rules Update

Date: 2026-03-23-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301454 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:301455 <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt
* 1:66154 <-> SERVER-WEBAPP SolarWinds Orion Platform insecure deserialization attempt
* 1:66155 <-> SERVER-WEBAPP Inductive Automation Ignition insecure deserialization attempt
* 1:66156 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:66159 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66160 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66161 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66162 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66163 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66164 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66165 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66166 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66167 <-> MALWARE-CNC Win.InfoStealer.Salat variant outbound communication
* 1:66170 <-> MALWARE-CNC Win.InfoStealer.XWorm variant outbound communication
* 1:66171 <-> MALWARE-CNC Win.InfoStealer.Quasar variant outbound communication
* 1:66172 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66173 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66174 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 3:66175 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66176 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66177 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66178 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt

Modified Rules:

* 1:65619 <-> SERVER-WEBAPP Fortinet FortiWeb SSO authentication bypass attempt
* 1:65876 <-> POLICY-OTHER AnomalyCo OpenCode command execution attempt


2026-03-24 13:12:39 UTC

Snort Subscriber Rules Update

Date: 2026-03-23-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.11.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301454 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:301455 <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt
* 1:66154 <-> SERVER-WEBAPP SolarWinds Orion Platform insecure deserialization attempt
* 1:66155 <-> SERVER-WEBAPP Inductive Automation Ignition insecure deserialization attempt
* 1:66156 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:66159 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66160 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66161 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66162 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66163 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66164 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66165 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66166 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66167 <-> MALWARE-CNC Win.InfoStealer.Salat variant outbound communication
* 1:66170 <-> MALWARE-CNC Win.InfoStealer.XWorm variant outbound communication
* 1:66171 <-> MALWARE-CNC Win.InfoStealer.Quasar variant outbound communication
* 1:66172 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66173 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66174 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 3:66175 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66176 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66177 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66178 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt

Modified Rules:

* 1:65619 <-> SERVER-WEBAPP Fortinet FortiWeb SSO authentication bypass attempt
* 1:65876 <-> POLICY-OTHER AnomalyCo OpenCode command execution attempt


2026-03-24 13:12:39 UTC

Snort Subscriber Rules Update

Date: 2026-03-23-002

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.12.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301454 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:301455 <-> MALWARE-OTHER Win.Trojan.Remcos variant download attempt
* 1:66154 <-> SERVER-WEBAPP SolarWinds Orion Platform insecure deserialization attempt
* 1:66155 <-> SERVER-WEBAPP Inductive Automation Ignition insecure deserialization attempt
* 1:66156 <-> SERVER-WEBAPP WordPress Metform Elementor Plugin cross site scripting attempt
* 1:66159 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66160 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66161 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66162 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66163 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66164 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66165 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66166 <-> SERVER-WEBAPP Advantech iView command injection attempt
* 1:66167 <-> MALWARE-CNC Win.InfoStealer.Salat variant outbound communication
* 1:66170 <-> MALWARE-CNC Win.InfoStealer.XWorm variant outbound communication
* 1:66171 <-> MALWARE-CNC Win.InfoStealer.Quasar variant outbound communication
* 1:66172 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66173 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 1:66174 <-> MALWARE-CNC Win.InfoStealer.Async variant outbound communication
* 3:66175 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66176 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66177 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt
* 3:66178 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2363 attack attempt

Modified Rules:

* 1:65619 <-> SERVER-WEBAPP Fortinet FortiWeb SSO authentication bypass attempt
* 1:65876 <-> POLICY-OTHER AnomalyCo OpenCode command execution attempt