
October's NoiseLetter is packed with treats (and some seriously tricky threat intel). We're talking getting yelled at by Amazon, RDP attacks that just won't die, + all the places we are headed to next. But first...keep your eyes peeled for our infamous CANDY BRACKET dropping later today! May the best candy win. 🍫🍬
VP of Data Science + Research, Bob Rudis, creatively gives his thoughts, hot-takes, and whatever else he feels like.

Security teams already have access to blocklists; commercial feeds, community lists, vendor-curated sets of bad IPs — they’ve been around for decades. And yet, every practitioner has experienced the same frustrations: the lists are too noisy, too static, too opaque, too slow to update, or just not quite meeting the right criteria.
That’s why GreyNoise built Block, a blocklist approach designed to be highly configurable, grounded in primary-sourced intelligence, and updated in real-time as attacker behavior changes.
We’re looking for Active Development Partners who would like to engage in security research by applying Suricata Rules and network packet queries to the GreyNoise historical dataset. If you're interested, please email product@greynoise.io.

*Have a joke you want included in the next NoiseLetter? Submit Your Joke >>


October's NoiseLetter is packed with treats (and some seriously tricky threat intel). We're talking getting yelled at by Amazon, RDP attacks that just won't die, + all the places we are headed to next. But first...keep your eyes peeled for our infamous CANDY BRACKET dropping later today! May the best candy win. 🍫🍬
VP of Data Science + Research, Bob Rudis, creatively gives his thoughts, hot-takes, and whatever else he feels like.

Security teams already have access to blocklists; commercial feeds, community lists, vendor-curated sets of bad IPs — they’ve been around for decades. And yet, every practitioner has experienced the same frustrations: the lists are too noisy, too static, too opaque, too slow to update, or just not quite meeting the right criteria.
That’s why GreyNoise built Block, a blocklist approach designed to be highly configurable, grounded in primary-sourced intelligence, and updated in real-time as attacker behavior changes.
We’re looking for Active Development Partners who would like to engage in security research by applying Suricata Rules and network packet queries to the GreyNoise historical dataset. If you're interested, please email product@greynoise.io.

*Have a joke you want included in the next NoiseLetter? Submit Your Joke >>

