[Tuning] Updated references (#4114)

This commit is contained in:
Ruben Groenewoud
2024-10-01 13:43:14 +02:00
committed by GitHub
parent ef4e433d97
commit 5b41bbd5e9
5 changed files with 10 additions and 5 deletions
@@ -2,7 +2,7 @@
creation_date = "2024/09/27"
integration = ["endpoint"]
maturity = "production"
updated_date = "2024/09/27"
updated_date = "2024/09/30"
[rule]
author = ["Elastic"]
@@ -64,6 +64,7 @@ This rule identifies potential exploitation attempts of several vulnerabilities
- Use insights from the incident to improve detection and response times in future incidents (MTTD and MTTR).
"""
references = [
"https://www.elastic.co/security-labs/cups-overflow",
"https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/",
"https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1",
"https://github.com/RickdeJager/cupshax/blob/main/cupshax.py",
@@ -2,7 +2,7 @@
creation_date = "2024/09/27"
integration = ["endpoint"]
maturity = "production"
updated_date = "2024/09/27"
updated_date = "2024/09/30"
[rule]
author = ["Elastic"]
@@ -64,6 +64,7 @@ This rule identifies potential exploitation attempts of several vulnerabilities
- Use insights from the incident to improve detection and response times in future incidents (MTTD and MTTR).
"""
references = [
"https://www.elastic.co/security-labs/cups-overflow",
"https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/",
"https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1",
"https://github.com/RickdeJager/cupshax/blob/main/cupshax.py",
@@ -2,7 +2,7 @@
creation_date = "2024/09/27"
integration = ["endpoint"]
maturity = "production"
updated_date = "2024/09/27"
updated_date = "2024/09/30"
[rule]
author = ["Elastic"]
@@ -65,6 +65,7 @@ This rule identifies potential exploitation attempts of several vulnerabilities
- Use insights from the incident to improve detection and response times in future incidents (MTTD and MTTR).
"""
references = [
"https://www.elastic.co/security-labs/cups-overflow",
"https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/",
"https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1",
"https://github.com/RickdeJager/cupshax/blob/main/cupshax.py",
@@ -2,7 +2,7 @@
creation_date = "2024/09/27"
integration = ["endpoint"]
maturity = "production"
updated_date = "2024/09/27"
updated_date = "2024/09/30"
[rule]
author = ["Elastic"]
@@ -64,6 +64,7 @@ This rule identifies potential exploitation attempts of several vulnerabilities
- Use insights from the incident to improve detection and response times in future incidents (MTTD and MTTR).
"""
references = [
"https://www.elastic.co/security-labs/cups-overflow",
"https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/",
"https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1",
"https://github.com/RickdeJager/cupshax/blob/main/cupshax.py",
@@ -2,7 +2,7 @@
creation_date = "2024/09/27"
integration = ["endpoint"]
maturity = "production"
updated_date = "2024/09/27"
updated_date = "2024/09/30"
[rule]
author = ["Elastic"]
@@ -65,6 +65,7 @@ This rule identifies potential exploitation attempts of several vulnerabilities
- Use insights from the incident to improve detection and response times in future incidents (MTTD and MTTR).
"""
references = [
"https://www.elastic.co/security-labs/cups-overflow",
"https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/",
"https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1",
"https://github.com/RickdeJager/cupshax/blob/main/cupshax.py",