NoiseLetter July 2025

Summary

Summer’s flying by and so are we, straight to Vegas for BlackHat +DEFCON! We’ll be on the Strip for our THIRD NoiseFest, back and louder than ever. We just dropped a brand new report, Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities. If you haven’t read it yet, now’s the time. Read through this NoiseLetter to catch up on all the things we've been up to this summer.

Bob Unfiltered

VP of Data Science + Research, Bob Rudis, creatively gives his thoughts, hot-takes, and whatever else he feels like.

Featured

Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities

What if attackers are acting weeks before a vulnerability is even disclosed? New research from GreyNoise shows a clear pattern: spikes in malicious activity often come before new CVEs are published, especially targeting enterprise edge tech like VPNs and firewalls. In 80% of cases studied, attackers struck before the vulnerability was made public. Early Warning Signals reveals this pattern, why it happens, and how defenders can act before the next CVE hits.  Download Now >>

Product Announcements

v3 API GA - we're announcing the GA of our new v3 APIs

Read all about what's new here!

As part of this update, we’re beginning the deprecation of our v2 APIs.

While these endpoints will continue to function for now, we encourage you to begin transitioning to v3 as we announce their release. Once all key v2 endpoints have a v3 counterpart, we will begin shutting off the v2 APIs.  See list of APIs here.

Are you interested in time travel through network packets?

We’re looking for Active Development Partners who would like to engage in security research by applying Suricata Rules and network packet queries to the GreyNoise historical dataset. If you're interested, please email product@greynoise.io.

Where to find us

Fresh Content

Recent Tags and Vulnerabilities

GreyNoise Labs released 55 tags during the month of July:

Community

  • Request a New GreyNoise Tag - We've just published a new page to allow our amazing community to submit tag requests to the GreyNoise team. 
  • Try our Free Account - Quickly identify noisy scanners and trending attacks with our free plan.
  • Join our Community Slack and Discord- We share intel, give real time updates, and the occasional Dad joke. 

Meme of the Month

Who else is ready for Hacker Summer Camp?

*Have a joke you want included in the next NoiseLetter? Submit Your Joke >>

Life @ GreyNoise

Not subscribed to our NoiseLetter? Subscribe here.

Summer’s flying by and so are we, straight to Vegas for BlackHat +DEFCON! We’ll be on the Strip for our THIRD NoiseFest, back and louder than ever. We just dropped a brand new report, Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities. If you haven’t read it yet, now’s the time. Read through this NoiseLetter to catch up on all the things we've been up to this summer.

Bob Unfiltered

VP of Data Science + Research, Bob Rudis, creatively gives his thoughts, hot-takes, and whatever else he feels like.

Featured

Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities

What if attackers are acting weeks before a vulnerability is even disclosed? New research from GreyNoise shows a clear pattern: spikes in malicious activity often come before new CVEs are published, especially targeting enterprise edge tech like VPNs and firewalls. In 80% of cases studied, attackers struck before the vulnerability was made public. Early Warning Signals reveals this pattern, why it happens, and how defenders can act before the next CVE hits.  Download Now >>

Product Announcements

v3 API GA - we're announcing the GA of our new v3 APIs

Read all about what's new here!

As part of this update, we’re beginning the deprecation of our v2 APIs.

While these endpoints will continue to function for now, we encourage you to begin transitioning to v3 as we announce their release. Once all key v2 endpoints have a v3 counterpart, we will begin shutting off the v2 APIs.  See list of APIs here.

Are you interested in time travel through network packets?

We’re looking for Active Development Partners who would like to engage in security research by applying Suricata Rules and network packet queries to the GreyNoise historical dataset. If you're interested, please email product@greynoise.io.

Where to find us

Fresh Content

Recent Tags and Vulnerabilities

GreyNoise Labs released 55 tags during the month of July:

Community

  • Request a New GreyNoise Tag - We've just published a new page to allow our amazing community to submit tag requests to the GreyNoise team. 
  • Try our Free Account - Quickly identify noisy scanners and trending attacks with our free plan.
  • Join our Community Slack and Discord- We share intel, give real time updates, and the occasional Dad joke. 

Meme of the Month

Who else is ready for Hacker Summer Camp?

*Have a joke you want included in the next NoiseLetter? Submit Your Joke >>

Life @ GreyNoise

Not subscribed to our NoiseLetter? Subscribe here.

Read the transcript