sigma_hq Profile Banner
sigma Profile
sigma

@sigma_hq

Followers
5K
Following
188
Media
16
Statuses
384

Generic Detection Rules for Log Data

Joined May 2020
Don't wanna be here? Send us removal request.
@nas_bench
Nasreddine Bencherchali
2 days
If you ever wondered what goes into merging a Sigma rule in the @sigma_hq repo, check out the latest blog. SigmaHQ Quality Assurance Pipeline - https://t.co/A2OuF1VOcw We delve into the process we go through to ensure the community contributed rules are up to par.
1
10
25
@nas_bench
Nasreddine Bencherchali
14 days
For all of the contributors that aim to propose enhancements or additions to the @sigma_hq specification in the future. We have introduced a new issue template that aims to track these proposals. We're calling it SEP (Sigma Enhancement Proposal). The template contains all the
0
4
25
@nas_bench
Nasreddine Bencherchali
15 days
Regression (True Positive) testing is coming to @sigma_hq starting from the next rule release in December. We will introduce a new CI that will validate a rule against a log. We will start with EVTX logs and extend beyond to other formats and logsources We're also introducing a
3
16
65
@nas_bench
Nasreddine Bencherchali
16 days
New Sigma release r2025-10-01 is available for download. 🌟37 New Rules πŸ›‘οΈ16 Rule updates πŸ”¬45 Rule Fixes Here is a quick overview: - New AWS and Github based rules covering deletion of VPC flows, KMS imports, changing archive status or pages of a repo - Winrs usage as a
0
7
28
@cyb3rops
Florian Roth ⚑️
16 days
We’d love to see more feedback from orgs that rely on Sigma rules Even simple stats from production use are valuable. - A rule of level high that triggered 236,992 times probably needs rework. - A rule of level critical that triggered 234 times probably needs rework. - A rule of
Tweet card summary image
discord.com
Discord is great for playing games and chilling with friends, or even building a worldwide community. Customize your own space to talk, play, and hang out.
3
14
51
@nas_bench
Nasreddine Bencherchali
28 days
Fun @sigma_hq stats for the end of the week. We have now reached 22 million package downloads since we started doing package releases 2 years ago. We also crossed 5700 PRs/Issues :)
0
4
17
@AtomicsonaFri
AtomicsonaFriday
1 month
⚑️ Sigma is shaping the future of detections. This Atomics on a Friday with @nas_bench explores: SigmaHQ deep dive https://t.co/RIBOa1FS4E in action Expert insights on security content’s evolution πŸŽ₯ Full video:
0
3
14
@nas_bench
Nasreddine Bencherchali
3 months
Because I and the rest of the maintainer team we dont have infinite time. I'm going to be pretty aggressive on PRs submitted to @sigma_hq https://t.co/MsdAvn8oNM New so called DEs copy pasting random rules and not having the capacity to read the specs will lead to an auto close
Tweet card summary image
github.com
Main Sigma Rule Repository. Contribute to SigmaHQ/sigma development by creating an account on GitHub.
3
6
37
@nas_bench
Nasreddine Bencherchali
4 months
New Sigma release r2025-07-08 is available for download. 🌟43 New Rules πŸ›‘οΈ34 Rule updates πŸ”¬27 Rule Fixes Explore the full release -> https://t.co/TLrfc4pJ9V This release introduces a bunch of new rules including detections for - Katz Stealer - MeshAgent usage -
3
38
101
@nas_bench
Nasreddine Bencherchali
6 months
New Sigma release r2025-05-21 is available for download. 🌟15 New Rules πŸ›‘οΈ47 Rule updates πŸ”¬13 Rule Fixes Explore the full release -> https://t.co/BVdXDmkU9X This release focused mainly on updates and tunings of older rules, with newer detections covering NimScan, AdFind,
1
21
65
@nas_bench
Nasreddine Bencherchali
8 months
Sigma rule packages have been downloaded more than 10M times since we started doing releases in late 2023! Last month package crossed the 2M mark today. πŸš€ @sigma_hq
2
14
79
@sifex
Ξ‘β…ΌΠ΅Ρ…
8 months
πŸŽ‰I am finally happy announce a brand new tool – https://t.co/qUsi2KPEML Sigma to SIEM conversion – done entirely locally (in-browser). Better support for Pipelines & Filters. Persistent workspaces, and Share & Export to Zip. Check it out down hereπŸ‘‡
detection.studio
Design, build and share detection rules for your security tools.
6
72
267
@nas_bench
Nasreddine Bencherchali
9 months
New Sigma release r2025–02–03 is available for download. 🌟5 New Rules πŸ›‘οΈ5 Rule updates πŸ”¬14 Rule Fixes Explore the full release -> https://t.co/CNzLQp4OHT This release saw the first wave of contribution from the @TheDFIRReport in a new collab we started with the team. πŸ”₯
0
17
53
@frack113
frack113
11 months
Many people use @sigma_hq rules. That's great. We like to share detection knowledge. Don't be afraid to contribute in 2025. Even a simple False Positive is good. If your boss don't want just ask until having an yes 😝
1
4
9
@nas_bench
Nasreddine Bencherchali
11 months
The more I see private detections the more I realize that the @sigma_hq rule repo is a gold mine and it is actually insane that its free. 😌
6
20
118
@nas_bench
Nasreddine Bencherchali
11 months
Last Sigma release of the year r2024-12-19 is available for download :) 🌟 12 New Rules πŸ›‘οΈ 52 Rule updates πŸ”¬ 6 Rule Fixes This release include multiple updates for Linux rules, new AWS rules and more. Check the full change log and start exploring this, by downloading the
2
26
60
@nas_bench
Nasreddine Bencherchali
11 months
Now that the last release of the year from @sigma_hq is out. I would like to reflect on the progress we made this year by sharing some stats :) - Merged 325 pull request. πŸš€ - Had 103 unique contributors. 🀝 - Added 313 new rules. πŸ“ - Updated and fixed the rules a combined
0
9
33
@cyb3rops
Florian Roth ⚑️
1 year
This is a really interesting web page published in the @Virustotal UI that lists the applied @sigma_hq rules on samples executed in their sandboxes and on how many of those samples the particular Sigma rule matched but not a single AV engine https://t.co/cTmWfVfWM4
2
34
119
@nas_bench
Nasreddine Bencherchali
1 year
New Sigma release r2024-11-10 is available for download 🌟 17 New Rules πŸ›‘οΈ 35 Rule updates πŸ”¬ 4 Rule Fixes This release includes rules covering - Suspicious .RDP file creation by Outlook and other uncommon processes. - IIS config tampering. - PowerShell Web Access abuse. -
0
36
109