From 119c74941f514cf7a4a63b2c7bd50bf683647269 Mon Sep 17 00:00:00 2001 From: Qasim Qlf Date: Fri, 3 Feb 2023 19:01:23 +0500 Subject: [PATCH] Update rules/windows/process_creation/proc_creation_win_termserv_proc_spawn.yml Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com> --- .../process_creation/proc_creation_win_termserv_proc_spawn.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/rules/windows/process_creation/proc_creation_win_termserv_proc_spawn.yml b/rules/windows/process_creation/proc_creation_win_termserv_proc_spawn.yml index f490fe253ef..a80d45a3dd2 100644 --- a/rules/windows/process_creation/proc_creation_win_termserv_proc_spawn.yml +++ b/rules/windows/process_creation/proc_creation_win_termserv_proc_spawn.yml @@ -6,7 +6,7 @@ references: - https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/rdp-stands-for-really-do-patch-understanding-the-wormable-rdp-vulnerability-cve-2019-0708/ author: Florian Roth (Nextron Systems) date: 2019/05/22 -modified: 2023/02/03 +modified: 2023/01/25 tags: - attack.initial_access - attack.t1190