Skip to content

Commit a1d2b73

Browse files
committed
updating links
1 parent e51e23a commit a1d2b73

File tree

2 files changed

+4
-15
lines changed

2 files changed

+4
-15
lines changed

detections/application/cisco_asa___logging_disabled_via_cli.yml

Lines changed: 2 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -32,14 +32,8 @@ known_false_positives: |
3232
troubleshooting, or device reconfiguration. These events should be verified
3333
against approved change management activities.
3434
references:
35-
- https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/
36-
- https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks
37-
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-z5xP8EUB
38-
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-code-exec-WmfP3h3O
39-
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-YROOTUW
40-
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-code-exec-WmfP3h3O
41-
- https://www.cisa.gov/news-events/directives/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices
42-
- https://www.ncsc.gov.uk/news/persistent-malicious-targeting-cisco-devices
35+
- https://www.cisco.com/site/us/en/products/security/firewalls/adaptive-security-appliance-asa-software/index.html
36+
- https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks
4337
drilldown_searches:
4438
- name: View the detection results for $host$
4539
search: '%original_detection_search% | search host = $host$'
@@ -68,9 +62,6 @@ tags:
6862
- Splunk Enterprise
6963
- Splunk Enterprise Security
7064
security_domain: network
71-
cve:
72-
- CVE-2025-20333
73-
- CVE-2025-20362
7465
tests:
7566
- name: True Positive Test
7667
attack_data:

stories/suspicious_cisco_adaptive_security_appliance_activity.yml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,8 @@ narrative: |
2020
2121
Monitoring activity from Cisco ASA and FTD devices is critical because these appliances serve as key security controls at the network perimeter. Analyzing their telemetry and syslog data helps organizations maintain visibility into device health, policy enforcement, and potential threats. Regular monitoring enables early detection of unusual or unauthorized activity, supports compliance requirements, and strengthens the overall security posture by ensuring that any deviations from expected behavior are promptly investigated.
2222
references:
23-
- https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/200184-Configure-Syslog-on-ASA.html
24-
- https://www.cisco.com/c/en/us/support/security/adaptive-security-appliance-asa-software/series.html
25-
- https://www.cisco.com/c/en/us/support/web/tsd-products-support-series-home.html#~security
26-
- https://blog.talosintelligence.com
23+
- https://www.cisco.com/site/us/en/products/security/firewalls/adaptive-security-appliance-asa-software/index.html
24+
- https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks
2725
tags:
2826
category:
2927
- Adversary Tactics

0 commit comments

Comments
 (0)