GreyNoise Launches Block: Fully configurable, real-time blocklists
Learn More
Why GreyNoise
Products
Enterprise and Government
GreyNoise Platform
Real-time, verifiable network threat intelligence
Greynoise Platform Use Cases
CVE Disclosure Early Warning
Get an early warning when traffic spikes indicate a high likelihood of new disclosures
Compromised Asset Detection
Find out immediately if an asset communicates with a malicious IP address
Vulnerability Prioritization
Get real-time insight into active exploitation trends to better understand risk and severity
SOC Efficiency
Filter out noisy, low priority and false-positive alerts from mass internet scanners
Incident Investigation
Add context to incidents to speed the determinations of scope and timelines
Threat Hunting
Quickly identify anomalous behavior and enrich your threat hunting campaigns
Small and Mid-Sized Businesses
GreyNoise Block
Fully configurable, real-time blocklists to stop attackers in their tracks
Learn More
Integrations
GreyNoise Integrations
SIEM
SOAR
TIP
Firewall
Resources
Blog
Resource Library
Storm Watch Podcast
Tag Request
Documentation
Company
About
In the News
Press Room
Upcoming Events
Partners
Community
Careers
GreyNoise Love
Login
Search for free
Get a demo
Get a demo
Login
Search data
Why GreyNoise
Products
Enterprise and Government
Greynoise Platform
Fully configurable, real-time blocklists to stop attackers in their tracks
GreyNoise Platform use Cases
CVE Disclosure Early Warning
Get an early warning when traffic spikes indicate a high likelihood of new disclosures
Compromised Asset Detection
Find out immediately if an asset communicates with a malicious IP address
Vulnerability Prioritization
Get real-time insight into active exploitation trends to better understand risk and severity
SOC Efficiency
Filter out noisy, low priority and false-positive alerts from mass internet scanners
Incident Investigation
Add context to incidents to speed the determinations of scope and timelines
Threat Hunting
Quickly identify anomalous behavior and enrich your threat hunting campaigns
Small and Mid-Sized Businesses
Greynoise Block
Fully configurable, real-time blocklists to stop attackers in their tracks
Integrations
GreyNoise Integrations
SIEM
SOAR
TIP
Firewall
Resources
Blog
Resource Library
Storm Watch Podcast
Tag Request
Documentation
Company
About
Press Room
In the News
Upcoming Events
Partners
Community
Careers
GreyNoise Love
GreyNoise in the news
The latest news, announcements, and perspectives from GreyNoise.
Attackers Ramp Up Efforts Targeting Developer Secrets
May 2, 2025
4,800+ IPs Used in Massive Recon Attack Targeting Git Configuration Files — What You Need to Know
May 1, 2025
Exposed Git tokens and secrets are being hoovered up by hacker scans
Apr 30, 2025
Exposed Git configuration file scanning escalates
Apr 30, 2025
Spike in Git Configuration Crawling Highlights Risk of Codebase Exposure
Apr 30, 2025
Hackers browse scans for leaked git token and secrets
Apr 30, 2025
Cybercriminals intensify hunt for exposed Git secrets
Apr 30, 2025
Exposed Git tokens and secrets are being hoovered up by hacker scans
Apr 30, 2025
Spike in Git Config Crawling: 4,800+ IPs Targeting Exposed Repositories
Apr 29, 2025
Hackers ramp up scans for leaked Git tokens and secrets
Apr 29, 2025
Vulnerability Exploitation Is Shifting in 2024-25
Apr 29, 2025
Massive Attack: 4,800+ IPs Used to Target Git Configuration Files
Apr 29, 2025
Hackers ramp up scans for leaked Git tokens and secrets
Apr 29, 2025
Surge in Cyberattacks Targeting Git Files
Apr 29, 2025
Massive Surge in Git Config File Scanning Raises Cybersecurity Red Flags Worldwide
Apr 29, 2025
Hackers ramp up scans for leaked Git tokens and secrets
Apr 29, 2025
Hackers Actively Attacking Git Configuration Files From 4,800+ IP’s
Apr 29, 2025
Massive Attack: 4,800+ IPs Used to Target Git Configuration Files
Apr 29, 2025
Escalating Attacks Against Ivanti VPN Appliances Detected
Apr 28, 2025
Escalating Attacks Against Ivanti VPN Appliances Detected
Apr 28, 2025
Ivanti VPNs See Major Surge in Scanning Activity
Apr 28, 2025
Escalating attacks against Ivanti VPN appliances expected
Apr 28, 2025
More Ivanti attacks may be on horizon, say experts who are seeing 9x surge in endpoint scans
Apr 25, 2025
More Ivanti attacks may be on horizon, say experts who are seeing 9x surge in endpoint scans
Apr 25, 2025
Previous
16 / 45
Next
Cookie Settings
We use cookies to ensure you get the best experience on our website.
Learn more
Got it