<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Sourcefire Petya Ransomeware in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/sourcefire-petya-ransomeware/m-p/3026951#M42737</link>
    <description>&lt;P&gt;Hi Cisco Support!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;May we know if Sourcefire can now block the latest trends Petya Ransomeware? What is the latest VDB/signature update on IPS?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 13:52:15 GMT</pubDate>
    <dc:creator>ccg-security</dc:creator>
    <dc:date>2019-03-10T13:52:15Z</dc:date>
    <item>
      <title>Sourcefire Petya Ransomeware</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-petya-ransomeware/m-p/3026951#M42737</link>
      <description>&lt;P&gt;Hi Cisco Support!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;May we know if Sourcefire can now block the latest trends Petya Ransomeware? What is the latest VDB/signature update on IPS?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:52:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-petya-ransomeware/m-p/3026951#M42737</guid>
      <dc:creator>ccg-security</dc:creator>
      <dc:date>2019-03-10T13:52:15Z</dc:date>
    </item>
    <item>
      <title>New Ransomware Variant</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-petya-ransomeware/m-p/3026952#M42738</link>
      <description>&lt;H3 class="post-title entry-title" itemprop="name"&gt;&lt;A href="http://blog.talosintelligence.com/2017/06/worldwide-ransomware-variant.html"&gt;New Ransomware Variant "Nyetya" Compromises Systems Worldwide&lt;/A&gt;&lt;/H3&gt;</description>
      <pubDate>Wed, 28 Jun 2017 05:39:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-petya-ransomeware/m-p/3026952#M42738</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2017-06-28T05:39:06Z</dc:date>
    </item>
    <item>
      <title>As noted in the TALOS blog</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-petya-ransomeware/m-p/3026953#M42739</link>
      <description>&lt;P&gt;As noted in the TALOS blog Leo linked - yes NGFW/NGIPS will prevent the compromise (assuming it is setup correctly).&lt;/P&gt;
&lt;P&gt;The same Snort Rule Update &lt;SPAN&gt;(released back in April)&amp;nbsp;&lt;/SPAN&gt;that covered Microsoft's MS17-010 blocks the CnC traffic.&lt;/P&gt;
&lt;P&gt;The incoming infection can be blocked by AMP if you have it licensed and a file protection policy in place.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2017 10:31:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-petya-ransomeware/m-p/3026953#M42739</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-28T10:31:07Z</dc:date>
    </item>
  </channel>
</rss>

