Just Released!
GreyNoise 2026 State Of The Edge Report
Download Report
Why GreyNoise
Products
Enterprise and Government
GreyNoise Platform
Real-time, verifiable network threat intelligence
Greynoise Platform Use Cases
CVE Disclosure Early Warning
Get an early warning when traffic spikes indicate a high likelihood of new disclosures
Compromised Asset Detection
Find out immediately if an asset communicates with a malicious IP address
Vulnerability Prioritization
Get real-time insight into active exploitation trends to better understand risk and severity
SOC Efficiency
Filter out noisy, low priority and false-positive alerts from mass internet scanners
Incident Investigation
Add context to incidents to speed the determinations of scope and timelines
Threat Hunting
Quickly identify anomalous behavior and enrich your threat hunting campaigns
Small and Mid-Sized Businesses
GreyNoise Block
Fully configurable, real-time blocklists to stop attackers in their tracks
Learn More
Integrations
GreyNoise Integrations
SIEM
SOAR
TIP
Firewall
Resources
Blog
Resource Library
Storm Watch Podcast
Tag Request
Documentation
Company
About
In the News
Press Room
Upcoming Events
Partners
Community
Careers
GreyNoise Love
Login
Search for free
Get a demo
Get a demo
Login
Search data
Why GreyNoise
Products
Enterprise and Government
Greynoise Platform
Fully configurable, real-time blocklists to stop attackers in their tracks
GreyNoise Platform use Cases
CVE Disclosure Early Warning
Get an early warning when traffic spikes indicate a high likelihood of new disclosures
Compromised Asset Detection
Find out immediately if an asset communicates with a malicious IP address
Vulnerability Prioritization
Get real-time insight into active exploitation trends to better understand risk and severity
SOC Efficiency
Filter out noisy, low priority and false-positive alerts from mass internet scanners
Incident Investigation
Add context to incidents to speed the determinations of scope and timelines
Threat Hunting
Quickly identify anomalous behavior and enrich your threat hunting campaigns
Small and Mid-Sized Businesses
Greynoise Block
Fully configurable, real-time blocklists to stop attackers in their tracks
Integrations
GreyNoise Integrations
SIEM
SOAR
TIP
Firewall
Resources
Blog
Resource Library
Storm Watch Podcast
Tag Request
Documentation
Company
About
Press Room
In the News
Upcoming Events
Partners
Community
Careers
GreyNoise Love
GreyNoise in the news
The latest news, announcements, and perspectives from GreyNoise.
Massive Exploit Scan Targets ColdFusion, Struts, and Elasticsearch Using Amazon IPs
May 28, 2025
Coordinated One-Day Cloud Scanning Operation Targets 75 Exposure Points
May 28, 2025
Thousands of Asus routers are being hit with stealthy, persistent backdoors
May 28, 2025
ASUS router backdoors affect 9K devices, persist after firmware updates
May 28, 2025
Questions mount as Ivanti tackles another round of zero-days
May 28, 2025
Botnet hacks 9,000+ ASUS routers to add persistent SSH backdoor
May 28, 2025
251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch
May 28, 2025
251 Malicious IPs Attacking Cloud-Based Devices Leveraging 75 Exposure Points
May 28, 2025
251 Malicious IPs Target Cloud-Based Device Exploiting 75 Exposure Points
May 28, 2025
Ivanti EPMM flaws leveraged in global Chinese cyberespionage attacks
May 23, 2025
Ivanti makes dedicated fans of Chinese spies who just can't resist attacking its buggy kit
May 23, 2025
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks
May 22, 2025
Ivanti makes dedicated fans of Chinese spies who just can't resist attacking its buggy kit
May 22, 2025
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks
May 22, 2025
Ivanti EPMM Bugs Combine for Unauthenticated RCE in the Wild
May 21, 2025
Textbook and testing giant Pearson hit by cyberattack, customer data leaked
May 9, 2025
Git configuration files targeted by attackers – Incidents are on the rise
May 5, 2025
Weekly Recap: Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors
May 5, 2025
Attackers Ramp Up Efforts Targeting Developer Secrets
May 2, 2025
4,800+ IPs Used in Massive Recon Attack Targeting Git Configuration Files — What You Need to Know
May 1, 2025
Exposed Git tokens and secrets are being hoovered up by hacker scans
Apr 30, 2025
Exposed Git configuration file scanning escalates
Apr 30, 2025
Spike in Git Configuration Crawling Highlights Risk of Codebase Exposure
Apr 30, 2025
Hackers browse scans for leaked git token and secrets
Apr 30, 2025
Previous
18 / 48
Next
Cookie Settings
We use cookies to ensure you get the best experience on our website.
Learn more
Got it