Ashlee Strickland
@astrickland.bsky.social
📤 13
📥 9
📝 7
reposted by
Ashlee Strickland
GreyNoise
3 months ago
Happy Halloween from your fave GreyNerds 🍬🍫
4
13
6
reposted by
Ashlee Strickland
GreyNoise
3 months ago
GreyNoise has observed a surge in PHP exploitation activity since late summer — now peaking as attackers deploy cryptominers at scale. Full analysis ⬇️
#GreyNoise
#PHP
#ThreatIntel
loading . . .
PHP Cryptomining Campaign: October/November 2025
From Aug–Oct 2025, GreyNoise observed a surge in exploitation attempts against PHP and PHP-based frameworks as attackers deployed cryptominers—driven by rising Bitcoin prices and higher mining payoffs...
https://www.greynoise.io/blog/php-cryptomining-campaign
0
5
2
reposted by
Ashlee Strickland
GreyNoise
4 months ago
Attacker infrastructure evolves in real time. Your defenses should too. Introducing GreyNoise Block, ensuring your blocklists update automatically. 🦾
loading . . .
Introducing GreyNoise Block: Fully configurable, real-time blocklists
Discover why traditional blocklists fail and how GreyNoise Block offers real-time, configurable, low-noise IP blocking powered by primary-sourced intelligence.
https://www.greynoise.io/blog/introducing-greynoise-block
0
5
2
reposted by
Ashlee Strickland
GreyNoise
4 months ago
GreyNoise has linked three concurrent campaigns targeting remote-access technologies — Palo Alto login attempts, Fortinet SSL VPN brute-forcing, and Cisco ASA scanning — all partially driven by the same threat actor(s) [High Confidence]. Full analysis 👇
#Palo
#Cisco
#Fortinet
#ThreatIntel
loading . . .
Palo Alto Scanning Surges ~500% in 48 Hours, Marking 90-Day High
On October 3, 2025, GreyNoise observed a ~500% increase in IPs scanning Palo Alto Networks login portals, the highest level recorded in the past 90 days. The activity was highly targeted and involved ...
https://www.greynoise.io/blog/palo-alto-scanning-surges
0
8
3
reposted by
Ashlee Strickland
GreyNoise
4 months ago
A 100,000-IP botnet is actively targeting U.S. RDP infrastructure. 🔗 Read the analysis 👇
#Cybersecurity
#RDP
#Botnet
#GreyNoise
loading . . .
100,000+ IP Botnet Launches Coordinated RDP Attack Wave Against US Infrastructure
Since October 8, 2025, GreyNoise has tracked a coordinated botnet operation involving over 100,000 unique IP addresses from more than 100 countries targeting Remote Desktop Protocol (RDP) services in ...
https://www.greynoise.io/blog/botnet-launches-coordinated-rdp-attack-wave
1
5
2
reposted by
Ashlee Strickland
GreyNoise
4 months ago
Hey
#CriblCon25
! 👋 Looking forward to seeing you soon! 👻🤝🐐
0
4
2
reposted by
Ashlee Strickland
GreyNoise
4 months ago
NoiseLetter, but make it fashionably late... 💅 We were at our company offsite, but we're back with our new GreyNoise MCP Server launch, Cisco ASA zero-day and VPN brute force insights, plus upcoming events, let's get into it!
loading . . .
NoiseLetter September 2025
Get GreyNoise updates! Read the September 2025 NoiseLetter for product news, key resources, the latest tags and vulnerabilities, and more.
https://www.greynoise.io/resources/noiseletter-september-2025
0
6
3
reposted by
Ashlee Strickland
GreyNoise
4 months ago
We got (most of) the team together last week and it was magical, so grateful for each + every one of these GreyNoids ✨
0
8
2
reposted by
Ashlee Strickland
GreyNoise
4 months ago
🚨GreyNoise has published a new Situation Report on Cisco ASA reconnaissance activity we observed before the new zero-days were disclosed. Read the full report:
info.greynoise.io/hubfs/Situat...
#Cisco
#ASA
#CiscoASA
#GreyNoise
#ThreatIntel
#CVE202520333
#CVE202520362
0
7
6
reposted by
Ashlee Strickland
GreyNoise
5 months ago
GreyNoise observed two scanning surges against Cisco ASA devices in late August, both representing significant elevations above baseline. This activity led to the discovery of a botnet cluster solely scanning for Cisco ASA on August 26.
#CiscoASA
#Cisco
#GreyNoise
#Cybersecurity
#ThreatIntel
loading . . .
25,000 IPs Scanned Cisco ASA Devices — New Vulnerability Potentially Incoming
GreyNoise observed two scanning surges against Cisco Adaptive Security Appliance (ASA) devices in late August including more than 25,000 unique IPs in a single burst. This activity represents a signif...
https://www.greynoise.io/blog/scanning-surge-cisco-asa-devices
0
5
3
reposted by
Ashlee Strickland
GreyNoise
5 months ago
On August 21, GreyNoise observed nearly 2,000 malicious IPs probing Microsoft Remote Desktop (RDP) services in a single day — a sharp deviation from baseline activity. Full blog:
www.greynoise.io/blog/surge-m...
#ThreatIntel
#RDP
#Cybersecurity
#GreyNoise
#Analysis
#RemoteDesktop
loading . . .
Nearly 2,000 Malicious IPs Probe Microsoft Remote Desktop in Single-Day Surge
On August 21, GreyNoise observed a sharp surge in scanning against Microsoft Remote Desktop (RDP) services.
https://www.greynoise.io/blog/surge-malicious-ips-probe-microsoft-remote-desktop#ThreatIntel
0
2
2
reposted by
Ashlee Strickland
GreyNoise
6 months ago
On August 3, we observed the largest single-day spike in brute-force activity against Fortinet SSL VPNs in recent months. Full breakdown of the campaign and how we traced it:
www.greynoise.io/blog/vulnera...
#Fortinet
#Cybersecurity
#ThreatIntel
#BruteForce
#GreyNoise
#SSL
#VPN
loading . . .
Coordinated Brute Force Campaign Targets Fortinet SSL VPN | GreyNoise
On August 3rd, 2025 GreyNoise observed a significant spike in brute-force traffic targeting Fortinet SSL VPNs. Over 780 unique IPs triggered our Fortinet SSL VPN Bruteforcer tag in a single day — the ...
https://www.greynoise.io/blog/vulnerability-fortinet-vpn-bruteforce-spike#Fortinet
1
9
6
reposted by
Ashlee Strickland
GreyNoise
6 months ago
🚨 New Research: GreyNoise identifies an early warning signal, spikes in attacker activity tend to precede new CVE disclosures within six weeks. Which vendors show the strongest signal and more, all in our latest report ⬇️
loading . . .
Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities
GreyNoise’s new research reveals a recurring pattern: spikes in malicious activity often precede the disclosure of new CVEs — especially in enterprise edge technologies like VPNs and firewalls.
https://www.greynoise.io/resources/early-warning-signals-attacker-behavior-precedes-new-vulnerabilities
0
5
6
reposted by
Ashlee Strickland
GreyNoise
6 months ago
An unexpected cluster of malicious IPs in a remote U.S. town led GreyNoise researchers to uncover a 500+ device botnet. Full analysis ⬇️
#Cybersecurity
#ThreatIntel
#Botnet
#VoIP
#GreyNoise
#Cyber
#Tech
loading . . .
A Spike in the Desert: How GreyNoise Uncovered a Global Pattern of VOIP-Based Telnet Attacks
A spike in botnet traffic from a single utility in a rural part of New Mexico led to the discovery of a global botnet. Explore how human-led, AI-powered analysis exposed compromised devices, uncovered...
https://www.greynoise.io/blog/how-greynoise-uncovered-global-pattern-voip-based-telnet-attacks
0
12
8
A Spike in the Desert: How GreyNoise Uncovered a Global Pattern of VOIP-Based Telnet Attacks
www.greynoise.io/blog/how-gre...
loading . . .
A Spike in the Desert: How GreyNoise Uncovered a Global Pattern of VOIP-Based Telnet Attacks
A spike in botnet traffic from a single utility in a rural part of New Mexico led to the discovery of a global botnet. Explore how human-led, AI-powered analysis exposed compromised devices, uncovered...
https://www.greynoise.io/blog/how-greynoise-uncovered-global-pattern-voip-based-telnet-attacks
6 months ago
0
0
0
reposted by
Ashlee Strickland
GreyNoise
7 months ago
GreyNoise observed exploitation of CitrixBleed 2 (CVE-2025-5777) nearly two weeks before a public PoC was released. Full breakdown ⬇️
#GreyNoise
#ThreatIntel
#CitrixBleed
#Citrix
#NetScaler
loading . . .
Exploitation of CitrixBleed 2 (CVE-2025-5777) Began Before PoC Was Public
GreyNoise has observed active exploitation attempts against CVE-2025-5777 (CitrixBleed 2), a memory overread vulnerability in Citrix NetScaler. Exploitation began on June 23 — nearly two weeks before a public proof-of-concept was released on July 4.
https://www.greynoise.io/blog/exploitation-citrixbleed-2-cve-2025-5777-before-public-poc
0
7
8
reposted by
Ashlee Strickland
GreyNoise
7 months ago
🚨 GreyNoise has observed a surge in scanning activity against MOVEit Transfer. Read the blog & see suspicious and malicious IPs ⬇️
#GreyNoise
#ThreatIntel
#Cybersecurity
loading . . .
Surge in MOVEit Transfer Scanning Activity Could Signal Emerging Threat Activity
GreyNoise has identified a notable surge in scanning activity targeting MOVEit Transfer systems, beginning on May 27, 2025. Prior to this date, scanning was minimal — typically fewer than 10 IPs obser...
https://www.greynoise.io/blog/surge-moveit-transfer-scanning-activity
0
12
5
reposted by
Ashlee Strickland
GreyNoise
8 months ago
VEGAS, WE ARE SO BACK! 🤘
loading . . .
GreyNoise - NoiseFest at BlackHat 2025
Join us for NoiseFest at BlackHat/DEFCON on Thursday, August 7th. Enjoy drinks, snacks, and engaging conversations with your peers. RSVP now!
https://info.greynoise.io/events/noisefest-blackhat-2025
1
10
3
reposted by
Ashlee Strickland
GreyNoise
8 months ago
New GreyNoise Labs research: CVE-2025-4748. Our team demonstrates how path traversal via zip archives can be used to achieve file write and code execution against Erlang OTP environments. Read the full tech breakdown here ⬇️
loading . . .
Exploiting Erlang OTP with Zip files: CVE-2025-4748 – GreyNoise Labs
Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation
https://www.labs.greynoise.io/grimoire/2025-06-17-erlang-zip/
0
5
5
reposted by
Ashlee Strickland
GreyNoise
8 months ago
GreyNoise Discovers Stealthy Backdoor Campaign Targeting ASUS Routers. Attacker tradecraft reflects APT-like behavior: quiet, durable, and designed for long-term access. Full blog ⬇️
#Cybersecurity
#ThreatIntel
#GreyNoise
#ASUS
loading . . .
GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers
GreyNoise uncovers a stealth campaign exploiting ASUS routers, enabling persistent backdoor access via CVE-2023-39780 and unpatched techniques. Learn how attackers evade detection, how GreyNoise disco...
http://www.greynoise.io/blog/stealthy-backdoor-campaign-affecting-asus-routers
1
18
16
reposted by
Ashlee Strickland
GreyNoise
8 months ago
🚨 On May 8, GreyNoise observed a coordinated scanning operation launched by 251 malicious IPs, all hosted by Amazon and geolocated in Japan. ColdFusion, Apache Struts, Tomcat targeted. Full analysis ⬇️
#Cybersecurity
#GreyNoise
#ThreatIntel
loading . . .
Coordinated Cloud-Based Scanning Operation Targets 75 Known Exposure Points in One Day
On May 8, GreyNoise observed a highly coordinated reconnaissance campaign launched by 251 malicious IP addresses, all geolocated to Japan and hosted by Amazon AWS. The infrastructure and execution sug...
https://www.greynoise.io/blog/coordinated-cloud-based-scanning-operation-targets-75-known-exposure-points
0
8
3
🚨 Today on Storm⚡ Watch: 2025’s Top Cybersecurity Threats EXPOSED: 0-Day Attacks, Chinese Hackers & Enterprise Breaches
www.youtube.com/watch?v=D-zZ...
@greynoise.io
@runzero.com
@censys.bsky.social
@vulncheck.bsky.social
loading . . .
Storm Watch | 2025’s Top Cyber Threats EXPOSED: 0-Day Attacks, Chinese Hackers & Enterprise Breaches
YouTube video by GreyNoise Intelligence
https://www.youtube.com/watch?v=D-zZ5AlrzD0
9 months ago
0
2
0
reposted by
Ashlee Strickland
GreyNoise
9 months ago
New Research Alert: Attackers are exploiting a dangerous class of cyber flaws—resurgent vulnerabilities. Learn how they work, why they matter, and what defenders can do. Full analysis ⬇️
#Cybersecurity
#GreyNoise
#Vulnerabilities
loading . . .
GreyNoise Uncovers Unique Risks From Resurgent Cybersecurity Vulnerabilities
Attackers from every corner of the internet are exploiting a uniquely dangerous class of cyber flaws: resurgent vulnerabilities.
https://www.greynoise.io/blog/greynoise-uncovers-unique-risks-from-resurgent-cybersecurity-vulnerabilities
0
5
3
reposted by
Ashlee Strickland
GreyNoise
9 months ago
Just launched: GreyNoise Global Observation Grid 🌐 5,000 sensors in 80+ countries delivering near real-time, verifiable threat intel. More signal, less noise.
loading . . .
GreyNoise Intelligence Launches Global Observation Grid to Provide Real-time Threat Intelligence on Network Attacks
With 5,000 sensors in 80 countries, the Global Observation Grid processes half a billion sessions per day. This ensures the most real-time, verifiable intelligence on internet scanning and exploitatio...
https://www.greynoise.io/press/greynoise-intelligence-launches-global-observation-grid-to-provide-real-time-threat-intelligence-on-network-attacks
0
5
2
🚨 Today on Storm⚡ Watch: InfosecSherpa Interview, Ukraine Drone Malware, & VulnCon Recap
www.youtube.com/watch?v=AItI...
@greynoise.io
@vulncheck.bsky.social
@runzero.com
@censys.bsky.social
loading . . .
Storm Watch | Cyber Threat Horizon: InfosecSherpa Interview, Ukraine Drone Malware, & VulnCon Recap
YouTube video by GreyNoise Intelligence
https://www.youtube.com/watch?v=AItIRLOa7cA
10 months ago
0
1
1
In case you missed Storm⚡ Watch this week. I would say they "crushed" it.
www.twitch.tv/videos/24273...
@greynoise.io
loading . . .
Storm Watch | 2025 Cyber Breakdown: CrushFTP Chaos, NVD Crisis & North Korean Threats - greynoiseio on Twitch
greynoiseio went live on Twitch. Catch up on their Talk Shows & Podcasts VOD now.
https://www.twitch.tv/videos/2427377742
10 months ago
0
1
0
reposted by
Ashlee Strickland
GreyNoise
10 months ago
Spike in Exploitation Attempts Targeting TVT NVMS9000 DVRs — reportedly used in security and surveillance systems. Full analysis ⬇️
#GreyNoise
#Exploitation
#ThreatIntel
#Cybersecurity
loading . . .
GreyNoise Observes 3X Surge in Exploitation Attempts Against TVT DVRs — Likely Mirai
GreyNoise has observed a significant spike in exploitation attempts against TVT NVMS9000 DVRs. This information disclosure vulnerability can be used to gain administrative control over affected system...
https://www.greynoise.io/blog/surge-exploitation-attempts-tvt-dvrs
0
5
4
reposted by
Ashlee Strickland
GreyNoise
10 months ago
‼ GreyNoise is pivoting to GreyVibes™: threat intel meets self-care. Just kidding. (Probably.) But you should go touch some grass today. Read the real March Noiseletter:
www.greynoise.io/resources/no...
loading . . .
NoiseLetter March 2025
Get GreyNoise updates! Read the March 2025 NoiseLetter for product news, key resources, the latest tags and vulnerabilities, and more.
https://www.greynoise.io/resources/noiseletter-march-2025
0
4
1
Today's Storm⚡️Watch episode "Cybercrime Evolution: Robot Dog Backdoors & Mob's Digital Takeover"
www.youtube.com/watch?v=Nhss...
@greynoise.io
@censys.bsky.social
@vulncheck.bsky.social
@runzero.com
loading . . .
Storm Watch | Cybercrime Evolution: Robot Dog Backdoors & Mob's Digital Takeover
YouTube video by GreyNoise Intelligence
https://www.youtube.com/watch?v=Nhsszu3IE1c
10 months ago
0
1
0
reposted by
Ashlee Strickland
GreyNoise
10 months ago
🚨 Surge in Palo Alto Networks Login Scanning Activity: Nearly 24,000 unique IPs have attempted access over the past 30 days. Full analysis ⬇️
#PANOS
#PaloAltoNetworks
#Vulnerability
loading . . .
Surge in Palo Alto Networks Scanner Activity Indicates Possible Upcoming Threats
Over the last 30 days, nearly 24,000 unique IP addresses have attempted to access these portals. The pattern suggests a coordinated effort to probe network defenses and identify exposed or vulnerable ...
https://www.greynoise.io/blog/surge-palo-alto-networks-scanner-activity
0
10
6
Today's episode of Storm⚡Watch
www.youtube.com/watch?v=iS3X...
@greynoise.io
@runzero.com
@censys.bsky.social
@vulncheck.bsky.social
loading . . .
Storm Watch | OpenAI 'Attack' Debunked: The Real Threat Lurking in Third-Party Wrappers
YouTube video by GreyNoise Intelligence
https://www.youtube.com/watch?v=iS3XNza0h1U
10 months ago
0
1
1
reposted by
Ashlee Strickland
Catalin Cimpanu
11 months ago
GreyNoise has identified a notable resurgence of in-the-wild activity targeting three ServiceNow vulnerabilities Over 70% of sessions in the past week were directed at systems in Israel.
www.greynoise.io/blog/in-the-...
loading . . .
Resurgence of In-The-Wild Activity Targeting Critical ServiceNow Vulnerabilities
GreyNoise has identified a notable resurgence of in-the-wild activity targeting three ServiceNow vulnerabilities CVE-2024-4879 (Critical), CVE-2024-5217 (Critical), and CVE-2024-5178 (Medium). These v...
https://www.greynoise.io/blog/in-the-wild-activity-targeting-critical-servicenow-vulnerabilities
0
7
5
reposted by
Ashlee Strickland
GreyNoise
11 months ago
🚨Active Exploitation Alert: Critical Apache Tomcat RCE (CVE-2025-24813). Majority of traffic targeting U.S.-based systems. Full analysis & attacker IPs⬇️
#ApacheTomcat
#Apache
#GreyNoise
#Vulnerability
#CVE202524813
loading . . .
GreyNoise Observes Active Exploitation of Critical Apache Tomcat RCE Vulnerability (CVE-2025-24813)
Attackers are actively exploiting Apache Tomcat servers by leveraging CVE-2025-24813. If successfully exploited it could enable remote code execution. GreyNoise has identified multiple IPs engaging in...
https://greynoise.io/blog/active-exploitation-critical-apache-tomcat-rce-vulnerability-cve-2025-24813
1
13
6
reposted by
Ashlee Strickland
GreyNoise
11 months ago
‼️NoiseFest is coming to RSA! 🤘 Drinks, raffles, & zero nonsense. Bring your F#@KtheNOISE energy + let’s have a good time!
loading . . .
GreyNoise - NoiseFest at RSAC 2025
Join us for NoiseFest at RSAC 2025 on April 30th, At the House of Shields. Enjoy drinks, snacks, and engaging conversations with your peers. RSVP now!
https://info.greynoise.io/events/noisefest-rsa-2025
0
3
2
Don't miss today's episode of Storm⚡️Watch! The team examines "unforgivable vulnerabilities" and the Ballista botnet exploiting CVE-2023-1389. Youtube -
www.youtube.com/watch?v=yiKg...
Twitch -
www.twitch.tv/greynoiseio
@greynoise.io
@censys.bsky.social
@runzero.com
@vulncheck.bsky.social
loading . . .
Storm Watch | Unforgivable Vulnerabilities & The Ballista Botnet Nightmare
YouTube video by GreyNoise Intelligence
https://www.youtube.com/watch?v=yiKgGSiIS6c
11 months ago
0
4
2
reposted by
Ashlee Strickland
GreyNoise
11 months ago
🚨 New DDoS Botnet Discovered: Over 30,000 Devices Reportedly Used in Attacks. Majority of observed activity traced to Iran. Block these IPs immediately.
#Cybersecurity
#GreyNoise
#Botnet
loading . . .
New DDoS Botnet Discovered: Over 30,000 Hacked Devices, Majority of Observed Activity Traced to Iran
A newly discovered global cyber threat is rapidly expanding, infecting tens of thousands of internet-connected devices to launch powerful cyberattacks.
https://greynoise.io/blog/new-ddos-botnet-discovered
1
9
4
reposted by
Ashlee Strickland
GreyNoise
11 months ago
🚨 Mass Exploitation of CVE-2024-4577 Detected. View and block malicious IPs now:
www.greynoise.io/blog/mass-ex...
#CVE20244577
#Cybersecurity
loading . . .
GreyNoise Detects Mass Exploitation of Critical PHP-CGI Vulnerability (CVE-2024-4577)
GreyNoise data confirms that exploitation of CVE-2024-4577 extends far beyond initial reports. Attack attempts have been observed across multiple regions, with notable spikes in the United States, Si...
https://www.greynoise.io/blog/mass-exploitation-critical-php-cgi-vulnerability-cve-2024-457
0
5
4
reposted by
Ashlee Strickland
GreyNoise
11 months ago
🚨 23 CVEs from Black Basta’s leaked chat logs are actively exploited. Some hit in the last 24 hrs, including CVE-2023-6875 (not in KEV).
#Cybersecurity
#ThreatIntel
#Ransomware
#BlackBasta
loading . . .
GreyNoise Detects Active Exploitation of CVEs Mentioned in Black Basta’s Leaked Chat Logs
Ransomware group Black Basta’s chat logs were leaked, revealing 62 mentioned CVEs. GreyNoise identified 23 of these CVEs as actively exploited, with some targeted in the last 24 hours.
https://greynoise.io/blog/greynoise-detects-active-exploitation-cves-black-bastas-leaked-chat-logs
0
7
3
reposted by
Ashlee Strickland
GreyNoise
11 months ago
Next week on Storm⚡️Watch, we chat with Mary N. Chaney, CEO of Minorities in Cybersecurity, on how diversity—across race, gender, neurodiversity & more—strengthens global cyber defenses. Don’t miss it!
loading . . .
Storm⚡️Watch
Storm⚡️Watch is a weekly podcast and livestream that digs deep into various cybersecurity topics and internet exploitation trends. Our goal is simple: to deliver insightful analyses, thought-provoking...
https://www.greynoise.io/stormwatch
0
4
4
reposted by
Ashlee Strickland
hrbrmstr 🇺🇦 🇬🇱 🇨🇦
12 months ago
Join us @ 10:30 ET for GreyNoise Storm⚡️Watch! Today, we ask if you think your WFH cow-orker seems sketch, they might literally be working from North Korea. We cover the bizarre tale of an Arizona woman busted for running a seekrit laptop farm.
https://stormwatch.ing/
1/3
1
1
2
reposted by
Ashlee Strickland
GreyNoise
12 months ago
🚨 CVE-2025-0108 is being actively exploited! 🚨 GreyNoise sees live attacks on PAN-OS firewalls. Patch now. Restrict access. Stay ahead. 🔗
www.greynoise.io/blog/greynoi...
loading . . .
GreyNoise Observes Active Exploitation of PAN-OS Authentication Bypass Vulnerability (CVE-2025-0108)
GreyNoise has observed active exploitation attempts targeting a newly disclosed authentication bypass vulnerability, CVE-2025-0108, affecting Palo Alto Networks PAN-OS
https://www.greynoise.io/blog/greynoise-observes-active-exploitation-of-pan-os-authentication-bypass-vulnerability-cve-2025-0108
0
8
6
reposted by
Ashlee Strickland
GreyNoise
12 months ago
🚨GreyNoise has observed a spike in exploitation attempts targeting: 🔹 CVE-2022-47945 (ThinkPHP LFI) 🔹 CVE-2023-49103 (ownCloud GraphAPI) Get the full breakdown →
loading . . .
New Exploitation Surge: Attackers Target ThinkPHP and ownCloud Flaws at Scale | GreyNoise Blog
GreyNoise has detected a surge in exploitation attempts for two vulnerabilities—one flagged as a top target by government agencies and another flying under the radar despite real-world attacks. See th...
https://greynoise.io/blog/new-exploitation-surge-attackers-target-thinkphp-and-owncloud-flaws-at-scale
0
4
2
reposted by
Ashlee Strickland
GreyNoise
about 1 year ago
Coming at you LIVE this Thursday @ 12 ET, check out GreyNoise University LIVE, where you can learn all the things, ask all the questions, + maybe even walk (scroll?) away with some sweet, sweet swag--don't miss it! 🤘
1
2
3
reposted by
Ashlee Strickland
hrbrmstr 🇺🇦 🇬🇱 🇨🇦
about 1 year ago
Join us @ 10:30 ET for GreyNoise Storm⚡️Watch! Today, the crew is risin' up, back on the street, and hangin' tough with Mark Ellzey, Senior Security Researcher @ Censys to learn how to stalk malicious prey wiht Censeye 🐅.
https://stormwatch.ing/
1/4
1
1
1
reposted by
Ashlee Strickland
GreyNoise
about 1 year ago
💡 Attackers act fast on public PoC code — sometimes within hours. On Dec 5, PoC for two Mitel MiCollab CVEs dropped, and GreyNoise immediately detected attacker activity. 🔎 Real-time intelligence is critical.
loading . . .
From PoC to Attacker Interest in Hours: Real-Time Insights into Mitel MiCollab Vulnerabilities | GreyNoise Blog
https://www.greynoise.io/blog/from-poc-to-attacker-interest-in-hours-real-time-insights-into-mitel-micollab-vulnerabilities
0
7
9
reposted by
Ashlee Strickland
GreyNoise
about 1 year ago
According to 220 of you, communication is cybersecurity’s secret sauce. 🎙️ Bridging tech to business, navigating Slack + generational gaps—it’s the skill shaping careers.
loading . . .
From Help Desk to CISO: How Communication Shapes Security Success | GreyNoise Blog
Effective communication is the most undervalued skill in cybersecurity, according to a Storm⚡️Watch podcast poll. Experts share insights on bridging technical complexity with business needs, using emo...
https://www.greynoise.io/blog/from-help-desk-to-ciso-how-communication-shapes-security-success
0
7
5
reposted by
Ashlee Strickland
GreyNoise
about 1 year ago
379,868 attempts to exploit CVE-2021-32030 failed due to one tiny error—precision matters. 🔍
loading . . .
GreyNoise Labs - Null problem! Or: the dangers of an invisible byte
A quick and silly post about a weird exploit situation
https://www.labs.greynoise.io/grimoire/2024-11-20-null-problem/
0
19
9
reposted by
Ashlee Strickland
GreyNoise
about 1 year ago
🚨 145,000 ICS systems exposed. Thousands of insecure interfaces. A new report reveals critical systems are left unprotected, giving attackers potential entry points. GreyNoise research shows these systems are rapidly scanned, with malicious activity.
www.greynoise.io/blog/new-rep...
0
4
1
reposted by
Ashlee Strickland
GreyNoise
about 1 year ago
If you’re at the API Cybersecurity Conference for the Oil & Natural Gas Industry, swing by booth 202 for some solid swag, a live demo, and an in-depth look at the noise that matters. See y'all there! 🤠
0
1
1
reposted by
Ashlee Strickland
GreyNoise
about 1 year ago
🚨 New Discovery: GreyNoise finds zero-day vulnerabilities in IoT-connected live streaming cameras with the help of AI, catching an attack before it could escalate. See a real-world example of AI + human expertise partnering on threat detection. Read more here.
loading . . .
GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI | GreyNoise Blog
GreyNoise has discovered previously undisclosed zero-day vulnerabilities in IoT-connected live streaming cameras, leveraging AI to catch an attack before it could escalate. This marks one of the first...
https://www.greynoise.io/blog/greynoise-intelligence-discovers-zero-day-vulnerabilities-in-live-streaming-cameras-with-the-help-of-ai
0
1
1
Load more
feeds!
log in