🛡️ Enhance your organization's #cybersecurity strategy with Censys Internet Intelligence! Track network changes, investigate risks, and strengthen your security posture using our comprehensive tools. With the largest IPv6 inventory and robust scan data, we help you meet NIST CSF 2.0 requirements effectively. Learn more ⬇
Censys’ Post
More Relevant Posts
-
🖥️ #ICYMI: As of July 2, Censys still observed 384K hosts referencing the malicious script following #Polyfill's domain suspension last month. SecurityWeek shares the latest deep dive from our research team -- and why there's concern for an even greater supply chain attack. Check it out here: https://lnkd.in/gJiYNgms
Over 380k Hosts Still Referencing Malicious Polyfill Domain: Censys
securityweek.com
To view or add a comment, sign in
-
Notice a spike or drop in active hosts? It might be a red flag! 🚩 #CensysTip: Analyze the historical trends in your data. Big changes could hint at suspicious events, like the start of a threat incident. Stay alert and keep your network safe! #CyberSecurity 🛡️🔍 Here's more ⬇
How to Investigate Unusual Internet Artifacts with Censys Search Data
censys.com
To view or add a comment, sign in
-
🚨As of today, 384k+ hosts still link to the defunct polyfill.io domain. In this blog we delve deeper into potential threat actor infrastructure & examine active hosts presenting associated domains ⬇
July 2: Polyfill.io Supply Chain Attack - Digging into the Web of Compromised Domains
censys.com
To view or add a comment, sign in
-
🚨CVE-2024-6387 / CVSS 8.1 alert! Critical vuln in OpenSSH (versions <4.4p1 & 8.5p1-9.8p1) on glibc-based Linux. Attackers could execute code, install malware, bypass firewalls & more.🔧 Patch now to OpenSSH 9.8p1! 🔍 Detect with Censys queries ⬇
July 2, 2024 Advisory: regreSSHion RCE Vulnerability in OpenSSH Server [CVE-2024-6387]
censys.com
To view or add a comment, sign in
-
🔒 Ever heard of Command and Control (C2) Infrastructure? It's like the ultimate remote control for servers! 💻 Security professionals use C2 to test and strengthen their defenses, but it's also a tool that hackers can misuse for malicious purposes. Understanding these uniquely identifiable default settings and configurations can make a big difference in staying ahead of threats. Here's more ⬇
C2: When Attackers Use Our Weapons Against Us
censys.com
To view or add a comment, sign in
-
🚀Introducing Saved Query Automation for Censys ASM! Set up email alerts for a saved query in your ASM inventory to proactively monitor for important changes to your attack surface. Request a demo to learn more: https://lnkd.in/dXYH2ftX 🧑💻
Saved Query Automation with Censys ASM
https://www.youtube.com/
To view or add a comment, sign in
-
📂 #ICYMI: #MOVEit is BACK. Last week, our team identified over 2.7k publicly exposed instances. Check out Matt Kapko full overview in Cybersecurity Dive for more details: https://lnkd.in/eS-Qani7
Progress discloses more MOVEit CVEs, one year after 2023’s fiasco
cybersecuritydive.com
To view or add a comment, sign in
-
Take a look at our #FollowAlongFriday demo and discover the power of Censys Search Community tier! 🚀 Whether you're new to #cybersecurity or a seasoned expert, there's something here for everyone. Dive in now! 🔽
Censys Search Community Tier Overview
https://www.youtube.com/
To view or add a comment, sign in
10,339 followers