1. 2016-01-29 [26] Re: [Emerging-Sigs] Daily Ruleset Update Summary 2015/12/3 emerging-si Francis Trudeau 2. 2016-01-29 [2] [Emerging-Sigs] False positives for sid 2021973 - ET CURRE emerging-si Will Metcalf 3. 2016-01-27 [1] [Emerging-Sigs] Suricata 3.0 is out! emerging-si Victor Julien 4. 2016-01-25 [2] [Emerging-Sigs] PCRat/Gh0st CnC traffic (OUTBOUND) 104 emerging-si Travis Green 5. 2016-01-25 [2] [Emerging-Sigs] Update rule revision when migrating signat emerging-si Will Metcalf 6. 2016-01-19 [3] [Emerging-Sigs] Possible false positive for 2022318 - ET T emerging-si Darien Huss 7. 2016-01-18 [1] [Emerging-Sigs] [OT] Release: check_ids_interfaces Nagios emerging-si Darren S. 8. 2016-01-18 [3] [Emerging-Sigs] Snort IDs/Rules emerging-si nasa_khizra 9. 2016-01-15 [8] [Emerging-Sigs] Rule 2014472 emerging-si James Lay 10. 2016-01-13 [2] [Emerging-Sigs] Possible Rule for Alureon/DNSChanger emerging-si Travis Green 11. 2016-01-13 [3] [Emerging-Sigs] False positives from Microsoft Groove and emerging-si Jeremy MJ 12. 2016-01-12 [1] [Emerging-Sigs] January 2016 Microsoft Patch Tuesday Cover emerging-si Francis Trudeau 13. 2016-01-11 [2] [Emerging-Sigs] New Rule - Invalid PHP User Agent emerging-si Travis Green 14. 2016-01-11 [2] [Emerging-Sigs] ET POLICY Python-urllib/ Suspicious User A emerging-si Travis Green 15. 2016-01-06 [2] [Emerging-Sigs] Offering a sig for detect Redis +OK reply emerging-si Francis Trudeau 16. 2016-01-06 [2] [Emerging-Sigs] SIG: ET CURRENT_EVENTS W32/Dridex Binary D emerging-si Kevin Ross 17. 2016-01-05 [2] [Emerging-Sigs] HotSpotShield emerging-si Jack Mott 18. 2016-01-05 [1] Re: [Emerging-Sigs] Why is "Let's encrypt free" A Bad Thin emerging-si Cooper F. Nelson 19. 2016-01-01 [1] [Emerging-Sigs] New ETPLC free connector with Splunk! emerging-si rmkml