#greynoise

2025-05-27

🚨 On May 8, GreyNoise observed a coordinated scanning operation launched by 251 malicious IPs, all hosted by Amazon and geolocated in Japan. ColdFusion, Apache Struts, Tomcat targeted. Full analysis: greynoise.io/blog/coordinated-

#Cybersecurity #GreyNoise #ThreatIntel

2025-05-20

GreyNoise observed a major spike in scanning against Ivanti products weeks before two zero-days were disclosed in Ivanti EPMM. Full update: greynoise.io/blog/surge-ivanti
#Ivanti #GreyNoise #Cybersecurity #ZeroDays

2025-05-13

📣 Presentation drop — GreyNoise recently shared intel + insights with our friends at IT-ISAC. Watch the 3 minute highlights to get up to speed & download our full report for the details: greynoise.io/resources/how-res #GreyNoise #Cybersecurity

2025-04-28

⚠️ Spike in Git Config Crawling Highlights Risk of Codebase Exposure. We observed 4,800+ malicious IPs engaged in this activity daily from April 20-21. Full analysis & malicious IPs: greynoise.io/blog/spike-git-co #Cybersecurity #ThreatIntel #GreyNoise

2025-04-23

New Research Alert: Attackers are exploiting a dangerous class of cyber flaws—resurgent vulnerabilities. Learn how they work, why they matter, and what defenders can do. Full analysis ⬇️
#Cybersecurity #GreyNoise #Vulnerabilities

greynoise.io/blog/greynoise-un

2025-04-17

Our Founder, @morris is speaking at QCTR next Friday on “The Big Hairy Edge Device Problem.” Don’t miss it. 🗓️ April 25, 8–10AM ET. Register: bit.ly/42x325a

#GreyNoise #QCTR #Cybersecurity

boB Rudis 🇺🇦 🇬🇱 🇨🇦hrbrmstr
2025-04-15

AI/LLM/GPT haters gonna hate, but this is fun/helpful.

A screenshot showing a query and detailed response related to network threat analysis. The user asks which tags are trending in activity this week and also have at least one day with more than 200 unique IPs. The response includes multiple internal query logs followed by a summarized list of trending tags, each with percentage increases in unique IP activity. Top trending tags include “njRAT Crawler” (297.8% increase), “Apache Tomcat Crawler” (233.5%), “Tomcat Manager Scanner” (170.4%), and others such as “Gh0st RAT Crawler” and various IoT-related scanners and backdoors. The summary notes increased activity in scanning and exploitation of services and IoT devices.
2025-04-07

Spike in Exploitation Attempts Targeting TVT NVMS9000 DVRs — reportedly used in security and surveillance systems. Full analysis: greynoise.io/blog/surge-exploi #GreyNoise #Exploitation #ThreatIntel #Cybersecurity

2025-04-07

New Threat Update from GreyNoise — Significant spike in exploitation attempts targeting Linksys E-Series routers, likely Mirai. Full analysis ⬇️
greynoise.io/blog/heightened-i

#Cybersecurity #ThreatIntel #GreyNoise #Mirai #Linksys

2025-04-01

In-the-wild activity targeting SonicWall, Zyxel, F5, Linksys, Zoho, and Ivanti. Surge on March 28. Full analysis: greynoise.io/blog/heightened-i

#GreyNoise #F5 #Ivanti #SonicWall #Zoho #Linksys #CVE #Vulnerability

2025-03-25

🚨 Following reports of widespread DrayTek router reboots, GreyNoise is bringing awareness to in-the-wild activity against multiple known vulnerabilities in DrayTek devices. Read the analysis ⬇️

greynoise.io/blog/in-the-wild-

#GreyNoise #ThreatIntel #Cybersecurity #DrayTek

2025-03-20

🚨Active Exploitation Alert: Critical Apache Tomcat RCE (CVE-2025-24813). Majority of traffic targeting U.S.-based systems. Exploits limited to naive attackers using PoC code. Full analysis & attacker IPs: greynoise.io/blog/active-explo
#ApacheTomcat #Apache #GreyNoise #Vulnerability #CVE202524813

GreyNoise Observes Active Exploitation of Critical Apache Tomcat RCE Vulnerability (CVE-2025-24813)
2025-03-12

🚨 March 12 UPDATE: Grafana Exploitation May Signal Multi-Phase SSRF Attacks. Update + original analysis: greynoise.io/blog/new-ssrf-exp #Cybersecurity #GreyNoise #Vulnerability

2025-03-06

🚨 GreyNoise has detected active exploitation of Silk Typhoon-linked CVEs in the past 24 hours. 90 threat IPs actively targeting. Full analysis: greynoise.io/blog/active-explo #GreyNoise #Cybersecurity #SilkTyphoon

2025-03-04

🚨 Exploitation of Newly Added KEV CVEs. GreyNoise tagged 3 of them before KEV addition. Full analysis: greynoise.io/blog/greynoise-ob
#GreyNoise #KEV #CISA

2025-02-28

🚨 New DDoS Botnet Discovered: Over 30,000 Devices Reportedly Used in Attacks. Majority of observed activity traced to Iran. Block these IPs immediately.

greynoise.io/blog/new-ddos-bot

#Cybersecurity #GreyNoise #Botnet

2024-11-25

I posted a quick/fun little blog about the dangers of invisible bytes, particularly when everybody copies/pastes exploits without understanding them:

labs.greynoise.io/grimoire/202

#vulnerability #exploit #greynoise #null #byte

2024-10-17

I love it when companies put their name in the PoC, it makes it so much easier to track down what I'm seeing when it gets sprayed out on the internet. Thanks watchTowr!

(This is Palo Alto Expedition - CVE-2024-9463)

@greynoise

#vulnerability #exploit #greynoise

Several exploit attempts that start with "ram=watchTowr" followed by a backtick (command injection) and a Curl request
2024-10-08

Just ran a pcap on one of my server, and I also get the LOVE letters of the #ICMP #noisestorm

#internet #noise #greynoise #LoveGreynoise #infosec

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst