Summer’s flying by and so are we, straight to Vegas for BlackHat +DEFCON! We’ll be on the Strip for our THIRD NoiseFest, back and louder than ever. We just dropped a brand new report, Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities. If you haven’t read it yet, now’s the time. Read through this NoiseLetter to catch up on all the things we've been up to this summer.
VP of Data Science + Research, Bob Rudis, creatively gives his thoughts, hot-takes, and whatever else he feels like.
What if attackers are acting weeks before a vulnerability is even disclosed? New research from GreyNoise shows a clear pattern: spikes in malicious activity often come before new CVEs are published, especially targeting enterprise edge tech like VPNs and firewalls. In 80% of cases studied, attackers struck before the vulnerability was made public. Early Warning Signals reveals this pattern, why it happens, and how defenders can act before the next CVE hits. Download Now >>
Read all about what's new here!
While these endpoints will continue to function for now, we encourage you to begin transitioning to v3 as we announce their release. Once all key v2 endpoints have a v3 counterpart, we will begin shutting off the v2 APIs. See list of APIs here.
We’re looking for Active Development Partners who would like to engage in security research by applying Suricata Rules and network packet queries to the GreyNoise historical dataset. If you're interested, please email product@greynoise.io.
*Have a joke you want included in the next NoiseLetter? Submit Your Joke >>
Summer’s flying by and so are we, straight to Vegas for BlackHat +DEFCON! We’ll be on the Strip for our THIRD NoiseFest, back and louder than ever. We just dropped a brand new report, Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities. If you haven’t read it yet, now’s the time. Read through this NoiseLetter to catch up on all the things we've been up to this summer.
VP of Data Science + Research, Bob Rudis, creatively gives his thoughts, hot-takes, and whatever else he feels like.
What if attackers are acting weeks before a vulnerability is even disclosed? New research from GreyNoise shows a clear pattern: spikes in malicious activity often come before new CVEs are published, especially targeting enterprise edge tech like VPNs and firewalls. In 80% of cases studied, attackers struck before the vulnerability was made public. Early Warning Signals reveals this pattern, why it happens, and how defenders can act before the next CVE hits. Download Now >>
Read all about what's new here!
While these endpoints will continue to function for now, we encourage you to begin transitioning to v3 as we announce their release. Once all key v2 endpoints have a v3 counterpart, we will begin shutting off the v2 APIs. See list of APIs here.
We’re looking for Active Development Partners who would like to engage in security research by applying Suricata Rules and network packet queries to the GreyNoise historical dataset. If you're interested, please email product@greynoise.io.
*Have a joke you want included in the next NoiseLetter? Submit Your Joke >>