1. 2016-01-29 [26] Re: [Emerging-Sigs] Daily Ruleset Update Summary 2015 emerging- Francis Trude 2. 2016-01-29 [2] [Emerging-Sigs] False positives for sid 2021973 - ET emerging- Will Metcalf 3. 2016-01-27 [1] [Emerging-Sigs] Suricata 3.0 is out! emerging- Victor Julien 4. 2016-01-25 [2] [Emerging-Sigs] PCRat/Gh0st CnC traffic (OUTBOUND) 10 emerging- Travis Green 5. 2016-01-25 [2] [Emerging-Sigs] Update rule revision when migrating s emerging- Will Metcalf 6. 2016-01-19 [3] [Emerging-Sigs] Possible false positive for 2022318 - emerging- Darien Huss 7. 2016-01-18 [1] [Emerging-Sigs] [OT] Release: check_ids_interfaces Na emerging- Darren S. 8. 2016-01-18 [3] [Emerging-Sigs] Snort IDs/Rules emerging- nasa_khizra 9. 2016-01-15 [8] [Emerging-Sigs] Rule 2014472 emerging- James Lay 10. 2016-01-13 [2] [Emerging-Sigs] Possible Rule for Alureon/DNSChanger emerging- Travis Green 11. 2016-01-13 [3] [Emerging-Sigs] False positives from Microsoft Groove emerging- Jeremy MJ 12. 2016-01-12 [1] [Emerging-Sigs] January 2016 Microsoft Patch Tuesday emerging- Francis Trude 13. 2016-01-11 [2] [Emerging-Sigs] New Rule - Invalid PHP User Agent emerging- Travis Green 14. 2016-01-11 [2] [Emerging-Sigs] ET POLICY Python-urllib/ Suspicious U emerging- Travis Green 15. 2016-01-06 [2] [Emerging-Sigs] Offering a sig for detect Redis +OK r emerging- Francis Trude 16. 2016-01-06 [2] [Emerging-Sigs] SIG: ET CURRENT_EVENTS W32/Dridex Bin emerging- Kevin Ross 17. 2016-01-05 [2] [Emerging-Sigs] HotSpotShield emerging- Jack Mott 18. 2016-01-05 [1] Re: [Emerging-Sigs] Why is "Let's encrypt free" A Bad emerging- Cooper F. Nel 19. 2016-01-01 [1] [Emerging-Sigs] New ETPLC free connector with Splunk! emerging- rmkml