Coming soon! Join Lukas Sismis and Juliana Fajardini ( @jufajardini ) during their webinar “Two for one: exploring Suricata Exception Policies and Firewall Mode (new in Suricata 8).”

On September 9th at 2:30 PM UTC, these two exceptional team members will discuss two different features” Exception Policies and The Firewall Mode. Don’t miss out on an overview of both functionalities, their advantages, possible pitfalls and how to take advantage of them in your Suricata setup.

Sign up today!

https://us02web.zoom.us/webinar/register/WN_cny4wBU6SXirofHO1wAdEw#/registration

#Suricata #SuricataWebinar

Tune in on September 9th for a webinar “Exploring Suricata Exception Policies and Firewall Mode (new in Suricata 8)” at 2:30 PM UTC. Join Lukas Sismis and @jufajardini for an in-depth conversation covering two game-changing functionalities.

Register: https://us02web.zoom.us/webinar/register/WN_cny4wBU6SXirofHO1wAdEw#/registration

#FreeWebinar #SuricataWebinar

We love it when we have an active audience, great webinar today, thanks all, thanks @da_667 and others who chimed in for making it even better!

#SuricataWebinar

We won't skip April's Suricata webinar! :D
Are you hungry for Suricata content, and always looking for good pcaps for your use cases? Don't miss this webinar.
With Peter Manev, we'll explore free & public sources for malware pcaps on April 29, 2:30 PM UTC.

Register: https://us02web.zoom.us/webinar/register/WN_pxm1a0e2TcepAyGc8JZcyQ

#SuricataWebinar #Suricata

Welcome! You are invited to join a webinar: Where to find free and public malware pcaps for Suricata. After registering, you will receive a confirmation email about joining the webinar.

In this session, Suricata long-time contributor and Stamus Networks' co-founder Peter Manev will show the ropes for finding resources of free and publicly available malware pcaps that one can use for many different purposes. For practical exercises, testing, tuning, showcasing, and more, having good pcaps is always important. When you are testing, when you try to differentiate between True Positive and False Positive, when you are trying to figure out and improve accuracy in a rule or if you need to improve that AI detection algorithm but want to throw in some real malware begaviour - you would definetly need some real malware pcaps. Watch this if you are a student, developer, threat analyst, Suricata integration enthusiast, or anyone who wants to learn about resources to have more and better network traffic samples to run your Suricata setup on. Peter is a co-founder of Stamus Networks, where he acts as CSO. He has been an active OISF member for a decade and has a 15-year-long record of activity in the field of IT security. An adamant admirer and explorer of innovative open-source security software, Peter is also the lead developer of SELKS.

Zoom

This March, join us for our traditional #Suricata @outreachy Webinar: From zero to detection: learning to expand Suricata's rule language!

Happening on March 13th at 2 PM UTC with Alice Akaki. She will cover the contributions made during her Outreachy 2024/2025 internship.

Register now: https://us02web.zoom.us/webinar/register/WN_g4NTk0HqQa-9TkJbOCKCRA#/registration

#SuricataWebinar

Welcome! You are invited to join a webinar: Suricata Outreachy Webinar: From zero to detection: learning to expand Suricata's rule language. After registering, you will receive a confirmation email about joining the webinar.

Once a year, Suricata welcomes one or two interns from around the globe to work on our project while learning how to contribute to Open Source communities. This webinar will cover the contributions made during the 2024/ 2025 Outreachy internship, focusing on adding new rule keywords to the Suricata rule language, especially for the recently added LDAP protocol. Alice will also talk about other aspects of contributing to Open Source and participating in the Outreachy program. Watch this if you're: - interested in knowing details on how to add new keywords to Suricata rule language; - new to contributing to open source/ Suricata and want to learn from the journey of others; - curious about what Outreachy internship projects. About the speaker: Alice Akaki is a beginner developer, a networking and infosec enthusiast, and is currently working as an Outreachy intern, adding new rule keywords to Suricata with a focus on the LDAP protocol Suricata is a high-performance, open-source network analysis and threat detection software used by most private and public organizations, and embedded by major vendors to protect their assets.

Zoom

Don't forget that this Thursday, February 20, 2025 at 3 PM UTC, we'll be with Mr Peter Manev for another #SuricataWebinar
In this, we'll go through an AI-enhanced #Suricata network security analysis of the Xloader malware. Get ready to explore common AI tools like ChatGPT/Gemini and their help in supplementing the security analysis of malicious payloads detected by Suricata.

If you haven't yet, there's still time to register :)
https://us02web.zoom.us/webinar/register/WN_esMZiBlyQ4CAuwEl0yfufQ#/registration

Welcome! You are invited to join a webinar: Suricata Webinar - AI analysis of Suricata network metadata and alert payloads with Peter Manev. After registering, you will receive a confirmation email about joining the webinar.

This hands-on webinar will go through an AI-enhanced Suricata network security analysis of the Xloader malware. We will explore commonly accessible AI tools like ChatGPT/Gemini and their help (including pros/cons) in supplementing the security analysis of malicious payloads detected by Suricata. Naturally, we will also explain what a Suricata alert payload is and the technical details behind that. The webinar will investigate a few network communication aspects of the infection, its detection with Suricata, and analysis of the resulting logs/artifacts - protocol, anomaly, flow, file transaction, and pcap. Peter is a co-founder of Stamus Networks, where he acts as CSO. He has been an active OISF member for a decade and has a 15-year-long record of activity in the field of IT security. An adamant admirer and explorer of innovative open-source security software, Peter is also the lead developer of SELKS.

Zoom

Tune in for a webinar with Peter Manev on February 20, 2025 at 10:00 AM EST.
This webinar will go through an AI-enhanced #Suricata network security analysis of the Xloader malware. Get ready to explore common AI tools like ChatGPT/Gemini and their help in supplementing the security analysis of malicious payloads detected by Suricata.

Register today! https://us02web.zoom.us/webinar/register/WN_esMZiBlyQ4CAuwEl0yfufQ#/registration

#SuricataWebinar

Welcome! You are invited to join a webinar: Suricata Webinar - AI analysis of Suricata network metadata and alert payloads with Peter Manev. After registering, you will receive a confirmation email about joining the webinar.

This hands-on webinar will go through an AI-enhanced Suricata network security analysis of the Xloader malware. We will explore commonly accessible AI tools like ChatGPT/Gemini and their help (including pros/cons) in supplementing the security analysis of malicious payloads detected by Suricata. Naturally, we will also explain what a Suricata alert payload is and the technical details behind that. The webinar will investigate a few network communication aspects of the infection, its detection with Suricata, and analysis of the resulting logs/artifacts - protocol, anomaly, flow, file transaction, and pcap. Peter is a co-founder of Stamus Networks, where he acts as CSO. He has been an active OISF member for a decade and has a 15-year-long record of activity in the field of IT security. An adamant admirer and explorer of innovative open-source security software, Peter is also the lead developer of SELKS.

Zoom

Join us in watching Tony Robinson’s (@da_667) webinar this Thursday, January 9th, at 3 PM UTC on “Honeytoken IDS rules & ET INFO Rules for Anomaly Detection.” This talk is going to focus on ways to spot anomalous activity for threats that may or may not have specific signatures.

There's still time to register: https://us02web.zoom.us/webinar/register/WN_MJogFww8S4mIpEOctaTZlw#/registration

#FreeWebinar #Suricata #SuricataWebinar

Welcome! You are invited to join a webinar: Honeytoken IDS rules and ET INFO Rules for Anomaly Detection with Tony Robinson. After registering, you will receive a confirmation email about joining the webinar.

This talk is going to be a double header, focusing on ways to spot anomalous activity for threats that may or may not have specific signatures. First, Tony will the value the ET INFO rule category can provide in spotting some of this anomalous activity. He'll discuss the rules use that provide value in spotting unusual activity, and how attendees can customize the ET INFO rule category to better suit their needs. The second part of this talk will show attendees how to use system specific artifacts to create IDS rules that can detect exfiltration of this data, for detecting anomalous activity. He'll also discuss using cyberchef to tranform and encode this data in various ways to create rules to detect obfuscation methods attackers use when exfiltrating this information. If there is time, Tony will talk about collaboration he has done with the maintainers of the secureworks dalton project that might make development of rules like this much easier.

Zoom