Have you ever wanted to know when exactly scanning for a Tag or vulnerability really started and how its behavior has changed? GreyNoise Trends shows you exactly that. With Trends you can see how many hits GreyNoise has seen across our sensor network for any of our Tags in both hourly and daily granularity.
Details on individual Tags, such as Microsoft Message Queuing (MSMQ) Crawler can be found by searching for and clicking on the Tag from our Tag List. This page additionally includes any timeline, associated CVE information, and resources that our team has found relevant.
And if you just want to know about what’s new, what’s weird, and what is changing on the internet, our Trends page shows Trending Tags, Anomalies, Most Active, and Most Recently added Tags.
Our GreyNoise research team stays on top of emerging vulnerabilities and exploits that result in internet-wide exploitation so that our users don’t miss an emerging threat. With our Trends feature, you can follow these emerging trends, and take action such as block malicious activity from your environment from our Tags page. We also publish regular reports that give customers insight into exploitation activity and threats.
It’s very easy! GreyNoise provides out-of-the-box integrations with many leading SIEM, SOAR, TIP, and other security solutions (view them here) . Customers can also use our comprehensive API to build custom integrations for their use cases. We also provide daily feeds of malicious or benign activity that can be used for bulk analysis integrations.
GreyNoise is constantly updating its databases in real-time. We have thousands of sensors across the world that monitor for internet-wide exploitation, and as soon as our sensors see activity, the behavior is tagged and visible to our customers. Our research team actively stays on top of emerging vulnerabilities to make sure GreyNoise’s NOISE database has the latest threats tagged. Our RIOT database, which labels common business services, is also refreshed regularly and updated with changes.