Head over to Netomize’s blog to learn about how we detect the exploitation of the CrushFTP Vulnerability (CVE-2025-31161) with PacketSmith’s Yara detection module, using the newly introduced track_state and flow_state keywords to the correlation engine.
submitted by /u/MFMokbel
[link] [comments]