mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

591
comptes actifs

#suricata

2 messages2 participants0 message aujourd’hui
E-TARD The LifeCaster<p>I got my new <a href="https://mastodon.online/tags/OPNsense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OPNsense</span></a> Router all built &amp; OPNsense is installed.<br>WoW OPNsense is cool but crazy deep.<br>It's going to take a little time for me to learn OPNsense, so I will not be using it just yet.<br>I'm also finding out how little I know about FreeBSD.<br>I have played with <a href="https://mastodon.online/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a> &amp; <a href="https://mastodon.online/tags/NetBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBSD</span></a> here &amp; there over many years but I never ran any BSD on my systems(Last time I was on a FreeBSD system was 2013).<br>Yes FreeBSD people this is where you LOL at the <a href="https://mastodon.online/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> guy🐧<br>I plan to run <a href="https://mastodon.online/tags/Suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata</span></a> &amp; <a href="https://mastodon.online/tags/Zenarmor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zenarmor</span></a></p>
Suricata<p>Suricata 8 is here! Curious to hear all about what’s new with this release? Tune in below to see what longtime Suricata developer, <span class="h-card" translate="no"><a href="https://infosec.exchange/@ish" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ish</span></a></span> has to say about his favorite features and what support Suricata is looking for from the community. </p><p><a href="https://www.youtube.com/watch?v=QzfrIflsEJw" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=QzfrIflsEJw</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata</span></a> <a href="https://infosec.exchange/tags/Suricata8" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata8</span></a></p>
Suricata<p>We're very excited to announce the release of Suricata 8.0.0! 🎉</p><p>We're proud of our OISF team and our great community, who contributes with code, tests, feedback... Thank you all!</p><p>🔸Get the release: <a href="https://www.openinfosecfoundation.org/download/suricata-8.0.0.tar.gz" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openinfosecfoundation.org/down</span><span class="invisible">load/suricata-8.0.0.tar.gz</span></a></p><p>Read more: <a href="https://forum.suricata.io/t/suricata-8-0-0-released" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forum.suricata.io/t/suricata-8</span><span class="invisible">-0-0-released</span></a></p><p><a href="https://infosec.exchange/tags/Suricata8" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata8</span></a> <a href="https://infosec.exchange/tags/Suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata</span></a></p>
Victor Julien<p>Did you know <a href="https://mastodon.social/tags/Suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata</span></a> has a newsletter now? You can read it online here:<br><a href="https://newsletter.suricata.io/posts/2025-06/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">newsletter.suricata.io/posts/2</span><span class="invisible">025-06/</span></a></p><p>To get it by email you can subscribe at the bottom of the page.</p>
CrowdSec<p>▶️ Register now for an upcoming webinar on boosting your cybersecurity defense with Suricata and CrowdSec!&nbsp;</p><p>Join our Ambassador Flaviu Vlaicu as he guides you through setting up Suricata and CrowdSec with Pushover notifications. You’ll also learn some best practices for deployment and management of these tools.&nbsp;</p><p>📅 June 5th at 4:30 PM CEST&nbsp;</p><p>Save your seat: <a href="https://app.livestorm.co/crowdsec/proactive-defense-crowdsec-suricata" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">app.livestorm.co/crowdsec/proa</span><span class="invisible">ctive-defense-crowdsec-suricata</span></a></p><p><a href="https://infosec.exchange/tags/Suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/webinar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webinar</span></a></p>
Suricata<p>We are pleased to announce our beta version of the Suricata 8.0 release! We want to share the main work we’ll be releasing soon so you can check and test it out, offer feedback, and share your thoughts before the release of Suricata 8.0.0, which is planned for July 8, 2025.</p><p>Get the release, test it, send feedback:<br>🔸 8.0.0-beta1: <a href="https://www.openinfosecfoundation.org/download/suricata-8.0.0-beta1.tar.gz" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openinfosecfoundation.org/down</span><span class="invisible">load/suricata-8.0.0-beta1.tar.gz</span></a></p><p>Release notes: <a href="https://forum.suricata.io/t/suricata-8-0-0-beta1-released" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forum.suricata.io/t/suricata-8</span><span class="invisible">-0-0-beta1-released</span></a></p><p><a href="https://infosec.exchange/tags/suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>suricata</span></a>-8-0-beta1-release</p>
Suricata<p>We'll be bringing back our awesome <a href="https://infosec.exchange/tags/SuricataTips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SuricataTips</span></a>! :D</p><p>It’s time for a <a href="https://infosec.exchange/tags/Suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata</span></a> tip of the month - with vintage logos! :P We’ll be sharing <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> and <a href="https://infosec.exchange/tags/tricks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tricks</span></a> to get you more easily acquainted with Suricata - Be sure to keep these in your repository for when you’re in a jam!</p><p><a href="https://infosec.exchange/tags/DidYouKnow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DidYouKnow</span></a> </p><p>`-S` flag can be used to load any signature file exclusively</p>
Sekoia.io<p>The analysis reveals I2PRAT as an emerging threat with activity noted from October 2024 to January 2025. As part of the investigation and within our mission to enhance cyber threat <a href="https://infosec.exchange/tags/detection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>detection</span></a>, we also share some <a href="https://infosec.exchange/tags/Sigma" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sigma</span></a> and <a href="https://infosec.exchange/tags/Suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata</span></a> detection rules! </p><p><a href="https://github.com/SEKOIA-IO/Community/tree/main/IOCs/I2PRAT" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/SEKOIA-IO/Community</span><span class="invisible">/tree/main/IOCs/I2PRAT</span></a></p>
da_667<p>Hey Hey People,</p><p>DA Here.</p><p>Do you, have a Suricata sensor in your network?</p><p>Do you, use Suricata as a part of sandbox that you run?</p><p>Have you, been hammering away at finding evil, and want to find more?</p><p>I'm doing a webinar courtesy of OISF this Thursday. 3PM UTC, which translates to 10am EST.</p><p>I'll be talking about two things during this meeting: One, is making good use of the ET INFO rule category as an early warning system.</p><p>Sure, there is a lot of noise to sift out of ET INFO, and for that reason, some choose to just cut it entirely. I'm here to show you how to grab the stuff we've seen in our sandboxes that can help to lead anomaly detection.</p><p>In the second part of this talk, I will talk about how you can convert network and system-specific artifacts into a set of Honeytoken-like IDS rules that again, can lead to anomaly detection, and perhaps even catching advanced or unidentified threats.</p><p>Here is a link to register for the meeting: <a href="https://us02web.zoom.us/webinar/register/WN_MJogFww8S4mIpEOctaTZlw#/registration" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">us02web.zoom.us/webinar/regist</span><span class="invisible">er/WN_MJogFww8S4mIpEOctaTZlw#/registration</span></a></p><p><a href="https://infosec.exchange/tags/Suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata</span></a> <a href="https://infosec.exchange/tags/EmergingThreats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EmergingThreats</span></a> <a href="https://infosec.exchange/tags/DetectionEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DetectionEngineering</span></a> <a href="https://infosec.exchange/tags/ThreatHunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatHunting</span></a> <a href="https://infosec.exchange/tags/OISF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OISF</span></a> <a href="https://infosec.exchange/tags/AnomalyDetection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AnomalyDetection</span></a></p>
Suricata<p>Join us in watching Tony Robinson’s (<span class="h-card" translate="no"><a href="https://infosec.exchange/@da_667" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>da_667</span></a></span>) webinar this Thursday, January 9th, at 3 PM UTC on “Honeytoken IDS rules &amp; ET INFO Rules for Anomaly Detection.” This talk is going to focus on ways to spot anomalous activity for threats that may or may not have specific signatures.</p><p>There's still time to register: <a href="https://us02web.zoom.us/webinar/register/WN_MJogFww8S4mIpEOctaTZlw#/registration" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">us02web.zoom.us/webinar/regist</span><span class="invisible">er/WN_MJogFww8S4mIpEOctaTZlw#/registration</span></a></p><p><a href="https://infosec.exchange/tags/FreeWebinar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeWebinar</span></a> <a href="https://infosec.exchange/tags/Suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata</span></a> <a href="https://infosec.exchange/tags/SuricataWebinar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SuricataWebinar</span></a></p>
Suricata<p>On January 9, Suricata webinars are back! 🎉 </p><p>Join Tony Robinson’s ( <span class="h-card" translate="no"><a href="https://infosec.exchange/@da_667" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>da_667</span></a></span> ) on January 9th at 10 AM EST - for a post-SuriCon talk: “Honeytoken IDS rules &amp; ET INFO Rules for Anomaly Detection.”</p><p>This talk is going to focus on ways to spot anomalous activity for threats that may or may not have specific signatures. </p><p>Register! <a href="https://us02web.zoom.us/webinar/register/WN_MJogFww8S4mIpEOctaTZlw#/registration" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">us02web.zoom.us/webinar/regist</span><span class="invisible">er/WN_MJogFww8S4mIpEOctaTZlw#/registration</span></a></p><p><a href="https://infosec.exchange/tags/Suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata</span></a> <a href="https://infosec.exchange/tags/Webinar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Webinar</span></a></p>
da_667<p>Just saw this pop up in my feed. <a href="https://any.run/cybersecurity-blog/phantomloader-and-ssload-analysis/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">any.run/cybersecurity-blog/pha</span><span class="invisible">ntomloader-and-ssload-analysis/</span></a></p><p>thanks <span class="h-card" translate="no"><a href="https://infosec.exchange/@screaminggoat" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>screaminggoat</span></a></span> </p><p>SSLoad currently doesn't use SSL for C2 Comms, opting for HTTP check-in, and key-exchange, before using a private key to encrypt tasking traffic.</p><p>We got you covered. Check out the following Suricata sids:</p><p>2047702 + 2047703 (External IP lookip to ipify.org) -- this isn't necessarily SSLoad activity, but the use of IP address lookup services is very common with most strains of malware</p><p>2052098 - SSLoad Initial Registration<br>2052169 - SSLoad Registration Response<br>2052099 - SSLoad Tasking Request</p><p><a href="https://infosec.exchange/tags/SSLoad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSLoad</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/Suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata</span></a> <a href="https://infosec.exchange/tags/Snort" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Snort</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a></p>
EmergingThreats<p>The ET Team is proud to announce our support for <a href="https://infosec.exchange/tags/Suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata</span></a> 7.0.3 with a newly updated and uplifted ruleset! Learn more here:</p><p><a href="https://community.emergingthreats.net/t/announcing-support-for-suricata-7-0-3/1735" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">community.emergingthreats.net/</span><span class="invisible">t/announcing-support-for-suricata-7-0-3/1735</span></a></p>
Suricata<p>Happening now our workshop about malware traffic analysis using <a href="https://infosec.exchange/tags/Suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata</span></a>, with <span class="h-card" translate="no"><a href="https://infosec.exchange/@jufajardini" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jufajardini</span></a></span> and <span class="h-card" translate="no"><a href="https://bird.makeup/users/lukassismis" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>lukassismis</span></a></span> at <span class="h-card" translate="no"><a href="https://fosstodon.org/@devconf_cz" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>devconf_cz</span></a></span> :) <br>And So happy to see our <span class="h-card" translate="no"><a href="https://hachyderm.io/@outreachy" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>outreachy</span></a></span> alumni Haleema Khan and Modupe Falodun here with us &lt;3</p>
Victor Julien<p>If you have some <a href="https://mastodon.social/tags/Suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata</span></a> related research or project to share, please consider submitting a talk to the next <a href="https://mastodon.social/tags/Suricon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricon</span></a> in Madrid:</p><p><a href="https://suricon.net/call-for-talks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">suricon.net/call-for-talks/</span><span class="invisible"></span></a></p>
Seth Grover<p>I'm pleased to be able to share some overview videos for <a href="https://malcolm.fyi/" rel="nofollow noopener noreferrer" target="_blank">Malcolm</a>, a powerful, easily deployable network traffic analysis tool suite. Together, these overview videos provide a brief introduction to Malcolm and some of its main components: OpenSearch Dashboards, Arkime, and NetBox. These videos were produced with funding from DHS CISA as part of an ongoing capabilities development pilot project.</p><p><a href="https://www.youtube.com/playlist?list=PLJg-83nW7AjOcSEiVMc4mODs4LzfVAwwN" rel="nofollow noopener noreferrer" target="_blank">Malcolm Overview Videos</a> on YouTube</p><p><a href="https://infosec.exchange/tags/Malcolm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malcolm</span></a> <a href="https://infosec.exchange/tags/HedgehogLinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HedgehogLinux</span></a> <a href="https://infosec.exchange/tags/Zeek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zeek</span></a> <a href="https://infosec.exchange/tags/Arkime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Arkime</span></a> <a href="https://infosec.exchange/tags/NetBox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetBox</span></a> <a href="https://infosec.exchange/tags/OpenSearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSearch</span></a> <a href="https://infosec.exchange/tags/Elasticsearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Elasticsearch</span></a> <a href="https://infosec.exchange/tags/Suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata</span></a> <a href="https://infosec.exchange/tags/PCAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PCAP</span></a> <a href="https://infosec.exchange/tags/NetworkTrafficAnalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkTrafficAnalysis</span></a> <a href="https://infosec.exchange/tags/networksecuritymonitoring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecuritymonitoring</span></a> <a href="https://infosec.exchange/tags/OT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OT</span></a> <a href="https://infosec.exchange/tags/ICS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ICS</span></a> <a href="https://infosec.exchange/tags/icssecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>icssecurity</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyber</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/INL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>INL</span></a> <a href="https://infosec.exchange/tags/DHS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DHS</span></a> <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> <a href="https://infosec.exchange/tags/CISAgov" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISAgov</span></a></p>
da_667<p>big hand to foxit for publishing their work pertaining to blister loader. Made a lot of sigs pertaining their cobalt strike and mythic C2 profiles. Those should be released tonight <a href="https://infosec.exchange/tags/Snort" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Snort</span></a> <a href="https://infosec.exchange/tags/Suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata</span></a> <a href="https://infosec.exchange/tags/BlisterLoader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlisterLoader</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a></p><p><a href="https://blog.fox-it.com/2023/11/01/popping-blisters-for-research-an-overview-of-past-payloads-and-exploring-recent-developments/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.fox-it.com/2023/11/01/pop</span><span class="invisible">ping-blisters-for-research-an-overview-of-past-payloads-and-exploring-recent-developments/</span></a></p>
Suricata<p>Hello, Mastodon world and InfoSec community around!</p><p>We are Suricata, the <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> network monitoring and security tool (and <br>more!) maintained by OISF.</p><p>Here we will be sharing <a href="https://infosec.exchange/tags/Suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata</span></a> news such as releases, upcoming webinars and<br>trainings, SuriCon updates, and events we're attending, as well interesting tips and<br>bits we see from our community, and, on the wonderful occasions when the<br>team meets, meerkat pics and gifs. :D</p><p>To start, we want to celebrate here the much-anticipated release of<br>Suricata 7. It's been out for a couple of weeks, and 7.0.1 is close by, so if<br>you have been waiting to update, get ready.</p><p>Release notes:<br><a href="https://forum.suricata.io/t/suricata-7-0-0-released" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forum.suricata.io/t/suricata-7</span><span class="invisible">-0-0-released</span></a></p><p>Feel free to tag us on Suricata-related topics and tools. :)</p>
Victor Julien<p><a href="https://mastodon.social/tags/Suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suricata</span></a> 7 released!</p><p><a href="https://forum.suricata.io/t/suricata-7-0-0-released/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forum.suricata.io/t/suricata-7</span><span class="invisible">-0-0-released/</span></a></p>
JSkier :archlinux: :debian:<p><span class="h-card"><a href="https://thisis.mylegendary.quest/users/twizzay" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>twizzay</span></a></span> oh, and IDS <a href="https://social.linux.pizza/tags/suricata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>suricata</span></a> language server, it's super slick. I'm sure I would have a stroke if I knew all the data M$ was harvesting on me 😳</p>