Talos Rules 2026-04-28
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the file-other, file-pdf, malware-cnc and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2026-04-28 13:29:20 UTC

Snort Subscriber Rules Update

Date: 2026-04-28

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:66381 <-> DISABLED <-> SERVER-WEBAPP Fortinet FortiClientEMS authentication bypass attempt (server-webapp.rules)
 * 1:66382 <-> DISABLED <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt (malware-cnc.rules)
 * 1:66383 <-> DISABLED <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt (malware-cnc.rules)
 * 1:66384 <-> DISABLED <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt (malware-cnc.rules)
 * 1:66385 <-> DISABLED <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt (malware-cnc.rules)
 * 1:66386 <-> DISABLED <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt (malware-cnc.rules)
 * 1:66387 <-> DISABLED <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt (malware-cnc.rules)
 * 1:66388 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt (file-pdf.rules)
 * 1:66389 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt (file-pdf.rules)
 * 1:66390 <-> DISABLED <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt (file-other.rules)
 * 1:66391 <-> DISABLED <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt (file-other.rules)
 * 1:66392 <-> DISABLED <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt (file-other.rules)
 * 1:66393 <-> DISABLED <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt (file-other.rules)
 * 1:66394 <-> DISABLED <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt (file-other.rules)
 * 1:66395 <-> DISABLED <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt (file-other.rules)
 * 1:66396 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt (malware-other.rules)
 * 1:66397 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt (malware-other.rules)

Modified Rules:


 * 1:59016 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt (server-webapp.rules)

2026-04-28 13:29:20 UTC

Snort Subscriber Rules Update

Date: 2026-04-28

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:66381 <-> DISABLED <-> SERVER-WEBAPP Fortinet FortiClientEMS authentication bypass attempt (server-webapp.rules)
 * 1:66393 <-> DISABLED <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt (file-other.rules)
 * 1:66392 <-> DISABLED <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt (file-other.rules)
 * 1:66391 <-> DISABLED <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt (file-other.rules)
 * 1:66397 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt (malware-other.rules)
 * 1:66382 <-> DISABLED <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt (malware-cnc.rules)
 * 1:66383 <-> DISABLED <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt (malware-cnc.rules)
 * 1:66384 <-> DISABLED <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt (malware-cnc.rules)
 * 1:66385 <-> DISABLED <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt (malware-cnc.rules)
 * 1:66386 <-> DISABLED <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt (malware-cnc.rules)
 * 1:66387 <-> DISABLED <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt (malware-cnc.rules)
 * 1:66388 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt (file-pdf.rules)
 * 1:66389 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt (file-pdf.rules)
 * 1:66390 <-> DISABLED <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt (file-other.rules)
 * 1:66395 <-> DISABLED <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt (file-other.rules)
 * 1:66394 <-> DISABLED <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt (file-other.rules)
 * 1:66396 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt (malware-other.rules)

Modified Rules:


 * 1:59016 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt (server-webapp.rules)

2026-04-28 13:29:20 UTC

Snort Subscriber Rules Update

Date: 2026-04-28

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:66392 <-> DISABLED <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt (file-other.rules)
 * 1:66395 <-> DISABLED <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt (file-other.rules)
 * 1:66397 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt (malware-other.rules)
 * 1:66396 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt (malware-other.rules)
 * 1:66382 <-> DISABLED <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt (malware-cnc.rules)
 * 1:66393 <-> DISABLED <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt (file-other.rules)
 * 1:66381 <-> DISABLED <-> SERVER-WEBAPP Fortinet FortiClientEMS authentication bypass attempt (server-webapp.rules)
 * 1:66394 <-> DISABLED <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt (file-other.rules)
 * 1:66390 <-> DISABLED <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt (file-other.rules)
 * 1:66391 <-> DISABLED <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt (file-other.rules)
 * 1:66384 <-> DISABLED <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt (malware-cnc.rules)
 * 1:66383 <-> DISABLED <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt (malware-cnc.rules)
 * 1:66386 <-> DISABLED <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt (malware-cnc.rules)
 * 1:66385 <-> DISABLED <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt (malware-cnc.rules)
 * 1:66388 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt (file-pdf.rules)
 * 1:66387 <-> DISABLED <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt (malware-cnc.rules)
 * 1:66389 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt (file-pdf.rules)

Modified Rules:


 * 1:59016 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt (server-webapp.rules)

2026-04-28 13:35:16 UTC

Snort Subscriber Rules Update

Date: 2026-04-27-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.2.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301485 <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt
* 1:301486 <-> POLICY-OTHER Marimo terminal WebSocket endpoint access attempt
* 1:301487 <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt
* 1:301488 <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt
* 1:301489 <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt
* 1:301490 <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt
* 1:66381 <-> SERVER-WEBAPP Fortinet FortiClientEMS authentication bypass attempt
* 1:66382 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66383 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66384 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66385 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66386 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66387 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt


2026-04-28 13:35:16 UTC

Snort Subscriber Rules Update

Date: 2026-04-27-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.5.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301485 <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt
* 1:301486 <-> POLICY-OTHER Marimo terminal WebSocket endpoint access attempt
* 1:301487 <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt
* 1:301488 <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt
* 1:301489 <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt
* 1:301490 <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt
* 1:66381 <-> SERVER-WEBAPP Fortinet FortiClientEMS authentication bypass attempt
* 1:66382 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66383 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66384 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66385 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66386 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66387 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt


2026-04-28 13:35:16 UTC

Snort Subscriber Rules Update

Date: 2026-04-27-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.6.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301485 <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt
* 1:301486 <-> POLICY-OTHER Marimo terminal WebSocket endpoint access attempt
* 1:301487 <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt
* 1:301488 <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt
* 1:301489 <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt
* 1:301490 <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt
* 1:66381 <-> SERVER-WEBAPP Fortinet FortiClientEMS authentication bypass attempt
* 1:66382 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66383 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66384 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66385 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66386 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66387 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt


2026-04-28 13:35:16 UTC

Snort Subscriber Rules Update

Date: 2026-04-27-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301485 <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt
* 1:301486 <-> POLICY-OTHER Marimo terminal WebSocket endpoint access attempt
* 1:301487 <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt
* 1:301488 <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt
* 1:301489 <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt
* 1:301490 <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt
* 1:66381 <-> SERVER-WEBAPP Fortinet FortiClientEMS authentication bypass attempt
* 1:66382 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66383 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66384 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66385 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66386 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66387 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt


2026-04-28 13:35:16 UTC

Snort Subscriber Rules Update

Date: 2026-04-27-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.7.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301485 <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt
* 1:301486 <-> POLICY-OTHER Marimo terminal WebSocket endpoint access attempt
* 1:301487 <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt
* 1:301488 <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt
* 1:301489 <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt
* 1:301490 <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt
* 1:66381 <-> SERVER-WEBAPP Fortinet FortiClientEMS authentication bypass attempt
* 1:66382 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66383 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66384 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66385 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66386 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66387 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt


2026-04-28 13:35:16 UTC

Snort Subscriber Rules Update

Date: 2026-04-27-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.9.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301485 <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt
* 1:301486 <-> POLICY-OTHER Marimo terminal WebSocket endpoint access attempt
* 1:301487 <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt
* 1:301488 <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt
* 1:301489 <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt
* 1:301490 <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt
* 1:66381 <-> SERVER-WEBAPP Fortinet FortiClientEMS authentication bypass attempt
* 1:66382 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66383 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66384 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66385 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66386 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66387 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt


2026-04-28 13:35:16 UTC

Snort Subscriber Rules Update

Date: 2026-04-27-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301485 <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt
* 1:301486 <-> POLICY-OTHER Marimo terminal WebSocket endpoint access attempt
* 1:301487 <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt
* 1:301488 <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt
* 1:301489 <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt
* 1:301490 <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt
* 1:66381 <-> SERVER-WEBAPP Fortinet FortiClientEMS authentication bypass attempt
* 1:66382 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66383 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66384 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66385 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66386 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66387 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt


2026-04-28 13:35:16 UTC

Snort Subscriber Rules Update

Date: 2026-04-27-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301485 <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt
* 1:301486 <-> POLICY-OTHER Marimo terminal WebSocket endpoint access attempt
* 1:301487 <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt
* 1:301488 <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt
* 1:301489 <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt
* 1:301490 <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt
* 1:66381 <-> SERVER-WEBAPP Fortinet FortiClientEMS authentication bypass attempt
* 1:66382 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66383 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66384 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66385 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66386 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66387 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt


2026-04-28 13:35:16 UTC

Snort Subscriber Rules Update

Date: 2026-04-27-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301485 <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt
* 1:301486 <-> POLICY-OTHER Marimo terminal WebSocket endpoint access attempt
* 1:301487 <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt
* 1:301488 <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt
* 1:301489 <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt
* 1:301490 <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt
* 1:66381 <-> SERVER-WEBAPP Fortinet FortiClientEMS authentication bypass attempt
* 1:66382 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66383 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66384 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66385 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66386 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66387 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt


2026-04-28 13:35:16 UTC

Snort Subscriber Rules Update

Date: 2026-04-27-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.12.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301485 <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt
* 1:301486 <-> POLICY-OTHER Marimo terminal WebSocket endpoint access attempt
* 1:301487 <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt
* 1:301488 <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt
* 1:301489 <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt
* 1:301490 <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt
* 1:66381 <-> SERVER-WEBAPP Fortinet FortiClientEMS authentication bypass attempt
* 1:66382 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66383 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66384 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66385 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66386 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66387 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt


2026-04-28 13:35:16 UTC

Snort Subscriber Rules Update

Date: 2026-04-27-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301485 <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt
* 1:301486 <-> POLICY-OTHER Marimo terminal WebSocket endpoint access attempt
* 1:301487 <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt
* 1:301488 <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt
* 1:301489 <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt
* 1:301490 <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt
* 1:66381 <-> SERVER-WEBAPP Fortinet FortiClientEMS authentication bypass attempt
* 1:66382 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66383 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66384 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66385 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66386 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66387 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt


2026-04-28 13:35:16 UTC

Snort Subscriber Rules Update

Date: 2026-04-27-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301485 <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt
* 1:301486 <-> POLICY-OTHER Marimo terminal WebSocket endpoint access attempt
* 1:301487 <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt
* 1:301488 <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt
* 1:301489 <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt
* 1:301490 <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt
* 1:66381 <-> SERVER-WEBAPP Fortinet FortiClientEMS authentication bypass attempt
* 1:66382 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66383 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66384 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66385 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66386 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66387 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt


2026-04-28 13:35:16 UTC

Snort Subscriber Rules Update

Date: 2026-04-27-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301485 <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt
* 1:301486 <-> POLICY-OTHER Marimo terminal WebSocket endpoint access attempt
* 1:301487 <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt
* 1:301488 <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt
* 1:301489 <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt
* 1:301490 <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt
* 1:66381 <-> SERVER-WEBAPP Fortinet FortiClientEMS authentication bypass attempt
* 1:66382 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66383 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66384 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66385 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66386 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66387 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt


2026-04-28 13:35:16 UTC

Snort Subscriber Rules Update

Date: 2026-04-27-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301485 <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt
* 1:301486 <-> POLICY-OTHER Marimo terminal WebSocket endpoint access attempt
* 1:301487 <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt
* 1:301488 <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt
* 1:301489 <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt
* 1:301490 <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt
* 1:66381 <-> SERVER-WEBAPP Fortinet FortiClientEMS authentication bypass attempt
* 1:66382 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66383 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66384 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66385 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66386 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66387 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt


2026-04-28 13:35:16 UTC

Snort Subscriber Rules Update

Date: 2026-04-27-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.11.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301485 <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt
* 1:301486 <-> POLICY-OTHER Marimo terminal WebSocket endpoint access attempt
* 1:301487 <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt
* 1:301488 <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt
* 1:301489 <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt
* 1:301490 <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt
* 1:66381 <-> SERVER-WEBAPP Fortinet FortiClientEMS authentication bypass attempt
* 1:66382 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66383 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66384 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66385 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66386 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66387 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt


2026-04-28 13:35:16 UTC

Snort Subscriber Rules Update

Date: 2026-04-27-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.12.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301485 <-> FILE-PDF Adobe Acrobat Reader arbitrary code execution attempt
* 1:301486 <-> POLICY-OTHER Marimo terminal WebSocket endpoint access attempt
* 1:301487 <-> FILE-OTHER Unitronics VisiLogic OPLC IDE long vlp filename buffer overflow attempt
* 1:301488 <-> FILE-OTHER Apple OSX Finder DMG volume name memory corruption attempt
* 1:301489 <-> FILE-OTHER ScadaTEC multiple products long filename buffer overflow attempt
* 1:301490 <-> MALWARE-OTHER Win.Trojan.Fast16 download attempt
* 1:66381 <-> SERVER-WEBAPP Fortinet FortiClientEMS authentication bypass attempt
* 1:66382 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66383 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66384 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66385 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66386 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt
* 1:66387 <-> MALWARE-CNC Pdf.Exploit.Agent variant outbound connection attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt