Profile avatar
greynoise.io
GreyNoise analyzes Internet background noise. Use GreyNoise to remove pointless security alerts, find compromised devices, or identify emerging threats.
237 posts 3,509 followers 24 following
Prolific Poster

🚨 Mass Exploitation of CVE-2024-4577 Detected. View and block malicious IPs now: www.greynoise.io/blog/mass-ex... #CVE20244577 #Cybersecurity

🚨 GreyNoise has detected active exploitation of Silk Typhoon-linked CVEs in the past 24 hours. 90 threat IPs actively targeting. Full analysis: www.greynoise.io/blog/active-... #GreyNoise #Cybersecurity #SilkTyphoon

🚨 Exploitation of Newly Added KEV CVEs. GreyNoise tagged 3 of them before KEV addition. Full analysis 👇 #GreyNoise #KEV #CISA

Hey Vegas! If you're headed to #HIMSS2025, make sure to swing by the @carahsoft.bsky.social booth tomorrow to catch a demo, snag some swag + chat with our folks! 🤘

🚨 New DDoS Botnet Discovered: Over 30,000 Devices Reportedly Used in Attacks. Majority of observed activity traced to Iran. Block these IPs immediately. #Cybersecurity #GreyNoise #Botnet

We're LIVE in 20 minutes!! 🚨

📢 GreyNoise’s 2025 Mass Internet Exploitation Report is here. 40% of exploited CVEs were 4+ years old — attackers relentlessly targeted new and old CVEs in 2024. Are you tracking live exploitation? 📥 Report: www.greynoise.io/blog/2025-ma...

I don't want to scare y'all, but I just checked the @greynoise.io sensor logs and found over 1000 sessions in the last hour that used this sophisticated technique (ie, attempted to download malware over ephemeral ports)!!

🚨 23 CVEs from Black Basta’s leaked chat logs are actively exploited. Some hit in the last 24 hrs, including CVE-2023-6875 (not in KEV). #Cybersecurity #ThreatIntel #Ransomware #BlackBasta

We are back this Thursday for another GreyNoise University LIVE! Join Michael + @itsjordyn.bsky.social for the latest news, an informative demo, your questions answered + maybe a dad joke or two! 🤘 www.greynoise.io/events/greyn...

🚨 Exploitation: Salt Typhoon-Linked CVEs 🚨 🔹 CVE-2023-20198 – 110+ IPs (🇧🇬🇧🇷🇸🇬) 🔹 CVE-2018-0171 – Attempts from 🇨🇭🇺🇸 #salttyphoon #cve

Next week on Storm⚡️Watch, we chat with Mary N. Chaney, CEO of Minorities in Cybersecurity, on how diversity—across race, gender, neurodiversity & more—strengthens global cyber defenses. Don’t miss it!

🚨 CVE-2025-0108 is being actively exploited! 🚨 GreyNoise sees live attacks on PAN-OS firewalls. Patch now. Restrict access. Stay ahead. 🔗 www.greynoise.io/blog/greynoi...

🔥 Time to heat things up on the next runZero Hour! Our research team welcomes friends from @greynoise.bsky.social to unpack: 🛠️ Network topology mapping, segmentation issues, & tags with suspicious intention ☝ Fingerprinting network devices 🩵 MODBUS protocol love 👉 www.runzero.com/research/run...

We got the band back together last week and it was ✨magical✨

new FQDN'd bluesky handle just dropped @greynoise.io 👀 let the poasting flow

🚨GreyNoise has observed a spike in exploitation attempts targeting: 🔹 CVE-2022-47945 (ThinkPHP LFI) 🔹 CVE-2023-49103 (ownCloud GraphAPI) Get the full breakdown →

probz not eric 🫶🏼

little GreyNoise (@greynoise.bsky.social) pipeline update

Feels like we've been in the January breakroom forever. 😵‍💫 This month's NoiseLetter is packed—zero-days, security updates + our new 'Suspicious' category. You may reintegrate now. 🫡

LIVE in 15 minutes!

After identifying a significant overlap between IPs exploiting CVE-2024-40891 and those classified as Mirai, the team investigated a recent variant of Mirai and confirmed that the ability to exploit CVE-2024-40891 has been incorporated into some Mirai strains.

🚨 Zero-day Zyxel Vulnerability (CVE-2024-40891) under active exploitation. This unpatched flaw exposes 1,500+ devices, enabling system compromise. Monitor traffic, restrict admin access, and track live attacks here:

🚨 Hackers Are Exploiting Fortinet Firewalls 🚨 15k+ FortiGate firewalls were breached via CVE-2022-40684. GreyNoise has spotted 366 compromised devices behaving abnormally. Defenders: Patch now, secure your systems, and check your IPs.

Coming at you LIVE this Thursday @ 12 ET, check out GreyNoise University LIVE, where you can learn all the things, ask all the questions, + maybe even walk (scroll?) away with some sweet, sweet swag--don't miss it! 🤘

💡 Threat intel feeds: do you really need one? 🤔 Cut through the noise with our no-fluff guide to smarter, scalable security decisions. 📖👉 www.greynoise.io/blog/evaluat...

DC folks! We will be at the SANS CTI Summit next Monday + Tuesday (Jan 27-28)! 🎉 Stop by our booth to chat with the team, learn about how we're simplifying threat intel, + snag some awesome swag, obvs. See you there! 👋 #SANSCTI www.sans.org/cyber-securi...

🎯Our ✨new✨ Suspicious category flags activity between Unknown and Malicious, like probing, scanning, and reconnaissance. Use it to enrich investigations, spot patterns, + monitor for escalation! Check it out today!🛡️

🚨 GreyNoise 101 just leveled up—welcome to GreyNoise University LIVE. 📚 Same vibe, + even better content. Join us the last Thursday of every month starting Jan 30, at 12 PM ET for live demos, fresh updates, + real-time Q&A.

New year, new NoiseLetter! Jumpstart the year with GreyNoise in this month's edition! 🎉

🚨 Overwhelmed by threat intel options? 🚨 Cut through the noise with our free guide: ✔️ Evaluate your intel needs ✔️ Compare embedded vs. dedicated feeds ✔️ Focus on ROI with expert insights 👉 Download today!

Not all internet traffic is naughty! Dive into the "nice" scanners that shape internet security 🎄

💡Vulnerability management isn’t just patching—it’s strategy. Our CPO Corey shares the critical trio for resilience: asset management, threat intel, + dynamic vuln assessment 🦾

💡 Attackers act fast on public PoC code — sometimes within hours. On Dec 5, PoC for two Mitel MiCollab CVEs dropped, and GreyNoise immediately detected attacker activity. 🔎 Real-time intelligence is critical.

Zero-day insights, fresh blogs, and the launch of our upgraded sensor and platform architecture. Catch all the highlights in this month's NoiseLetter! 🦃

GreyNoise 🤝 You Explore our open roles + see if your next opportunity is with us! 🔗 www.greynoise.io/careers

According to 220 of you, communication is cybersecurity’s secret sauce. 🎙️ Bridging tech to business, navigating Slack + generational gaps—it’s the skill shaping careers.

379,868 attempts to exploit CVE-2021-32030 failed due to one tiny error—precision matters. 🔍

🚨 145,000 ICS systems exposed. Thousands of insecure interfaces. A new report reveals critical systems are left unprotected, giving attackers potential entry points. GreyNoise research shows these systems are rapidly scanned, with malicious activity. www.greynoise.io/blog/new-rep...

🚨 Cyber threats hiding in plain sight? Join us TOMORROW as @andrewmorr.is + Daniel Grant reveal how AI + human expertise uncovered a zero-day exploit. Don't miss this insider look at smarter threat detection! ⏰ 12pm ET. Save your spot 👉 info.greynoise.io/webinar/zero...

If you’re at the API Cybersecurity Conference for the Oil & Natural Gas Industry, swing by booth 202 for some solid swag, a live demo, and an in-depth look at the noise that matters. See y'all there! 🤠

🤠 Howdy, Texas! We're headed to The Woodlands on Nov 11th + 12th for the API Cybersecurity Conference for the Oil & Natural Gas Industry! Can't wait to see y'all at booth 202! 🛢️

IoT threats, zero-days, + how we caught an exploit in action! Join our Founder @andrewmorr.is + Data Scientist Daniel Grant as they dive into AI + human teamwork for spotting threats hidden in the noise. 🗓️ Nov 19 @ 12pm ET https://buff.ly/40FelYR