softwareguideswar roomaboutgo-home
Latest Configuration Guides
Platform Title
Red Hat Enterprise Linux 6.5 Snort Intrusion Detection System w/ Barnyard2 and PostgreSQL Support
February 9, 2014
Red Hat Enterprise Linux 6.4 Apache 2 Web Server w/ PHP5, OpenSSL, Suhosin and PostgreSQL, MySQL, IBM DB2 and/or Oracle Databases
May 24, 2013
IBM AIX 7.1 Setting Up TCP/IP, SSH and a GNU C / C++ Development Environment on AIX
January 9, 2012

The Cavalry is a global grassroots organization that is focused on issues where computer security intersects public safety and human life. We strive to ensure that these technologies are worthy of the trust we place in them.

Media and Research Requests
For journalists of all media, please use my PGP key for e-mail communications. Most requests I receive are for validating claims of major security events or vulnerabilities.

About one out of every five events I examine turn out to be fully or partially true. Our little community is increasingly becoming filled with rotten apples.

There is also an assumption of anonymity on my part, with exceptions only in very specific and authorized situations.

For research discoveries and disclosure, I already have a trusted list of journalists. For individuals and groups looking to include me in their efforts, please communicate using my PGP key listed above. Do your due dilligence first. I get a lot of requests and vetting what is legitimate is time consuming..
threatpost|  News

Where’s the Equifax Data? Does It Matter?

15 February 2019 - Threat-hunters say the breached data from the massive Equifax incident is nowhere to be found, indicating a spy job.

Data Breach Bonanza: Dating Apps, Equifax, Mass Credential Dumps

15 February 2019 - Data-exposure "lowlights" for the week ending Feb. 15, 2019.

Eight Cryptojacking Apps Booted From Microsoft Store

15 February 2019 - The eight apps were secretly stealing victims' CPU power to mine for Monero.

Tips on How to Fight Back Against DNS Spoofing Attacks

15 February 2019 - Despite a welcome and needed DNS revamp, preventable abuse continues.

Trickbot Malware Goes After Remote Desktop Credentials

15 February 2019 - The banking trojan is consistently evolving in hopes of boosting its efficacy.

Snort  |  Blog

Snort rule update for Feb. 14, 2019

14 February 2019 - Just released:Snort Subscriber Rule Set Update for Feb. 14, 2019The newest SNORT® rule set was released today, courtesy of Cisco Talos. This release includes 14 new rules, five of which are shared object rules. There are also two modified rules.In this release, we provide coverage for several vulne…

Snort rule update for Feb. 12, 2019 — Microsoft Patch Tuesday

12 February 2019 - Just released:Snort Subscriber Rule Set Update for Feb. 12, 2019The newest SNORTⓇ rule set is here from Cisco Talos. In this release, we introduced 50 new rules, none of which are shared object rules. There are also eight modified rules, including two that are shared object rules.Th…

Snort rule update for Feb. 7, 2019

7 February 2019 - Just released:Snort Subscriber Rule Set Update for Feb. 7, 2019Cisco Talos just released the newest SNORT® rule set. This release includes 30 new rules and two modified rules, none of which are shared object rules.This release includes numerous rules for DarthMiner, a cryptocurrency miner targeting…

The most-used Snort signatures of 2018

6 February 2019 - Despite headline-making cyber attacks popping up again and again in 2018, SNORT® was still on the front lines protecting users on a day-to-day basis.Snort signatures protected our customers from some of the most common attacks that, even though they aren't as widely known, could be just as disrupti…

© 2001-2018 Procyon Labs / Randal T. Rioux