GreyNoise
@greynoise.infosec.exchange.ap.brid.gy
59 followers 0 following 180 posts
GreyNoise analyzes Internet background noise. Use GreyNoise to remove pointless security alerts, find compromised devices, or identify emerging threats […] [bridged from https://infosec.exchange/@greynoise on the fediverse by https://fed.brid.gy/ ]
Posts Media Videos Starter Packs
greynoise.infosec.exchange.ap.brid.gy
GreyNoise has linked three concurrent campaigns targeting remote-access technologies — Palo Alto login attempts, Fortinet SSL VPN brute-forcing, and Cisco ASA scanning — all partially driven by the same threat actor(s) High Confidence]. Full analysis 👇 […]
Original post on infosec.exchange
infosec.exchange
greynoise.infosec.exchange.ap.brid.gy
GreyNoise Feeds are here: real-time webhook alerts for CVE status changes, exploitation spikes, and IP classification changes. No more polling. Respond the moment threats emerge. 🦾
www.greynoise.io/blog/introducing-greynoise-feeds-real-time-intel-real-time-response
greynoise.infosec.exchange.ap.brid.gy
Palo login attempts are escalating, potentially driven by iteration through a large credential dataset. GreyNoise is sharing observed usernames/passwords for defender review.

🔗 Latest: https://www.greynoise.io/blog/palo-alto-scanning-surges

#paloaltonetworks #threatintel
greynoise.infosec.exchange.ap.brid.gy
NoiseLetter, but make it fashionably late... 💅 We were at our company offsite, but we're back with our new GreyNoise MCP Server launch, Cisco ASA zero-day and VPN brute force insights, plus upcoming events, let's get into it!

https://www.greynoise.io/resources/noiseletter-september-2025
NoiseLetter September 2025
Get GreyNoise updates! Read the September 2025 NoiseLetter for product news, key resources, the latest tags and vulnerabilities, and more.
www.greynoise.io
greynoise.infosec.exchange.ap.brid.gy
We got (most of) the team together last week and it was magical, so grateful for each + every one of these GreyNoids ✨
greynoise.infosec.exchange.ap.brid.gy
GreyNoise now has coverage for Cisco zero-days CVE-2025-20333 and CVE-2025-20362. Watch for exploit attempts in real-time:CVE-2025-20333
(Net-new): https://viz.greynoise.io/tags/cisco-asa-vpn-input-validation-cve-2025-20333-rce-attempt?days=1CVE-2025-20362
(Updated tag) […]
Original post on infosec.exchange
infosec.exchange
greynoise.infosec.exchange.ap.brid.gy
🚨GreyNoise has published a new Situation Report on Cisco ASA reconnaissance activity we observed before the new zero-days were disclosed.

Read the full report: https://info.greynoise.io/hubfs/Situation-Reports/SITREP-Cisco-Zero-Days.pdf

#cisco #asa […]

[Original post on infosec.exchange]
greynoise.infosec.exchange.ap.brid.gy
🗣️ Catch @Dio9sys talk this weekend at #pancakescon!
⏰ Sunday, 9/21 from 12:20–1:00 PM CT
🎤 One-liners and One Needle: Bash and Needlebinding
📺 https://www.youtube.com/live/P4Shsxwe5C0
greynoise.infosec.exchange.ap.brid.gy
greynoise.infosec.exchange.ap.brid.gy
GreyNoise University LIVE is back from a little summer break and ready to dive into demos, events, updates + dad jokes. Catch up with us TOMORROW at 12 ET! 📺
https://www.greynoise.io/events/greynoise-university-live
GreyNoise University LIVE
www.greynoise.io
greynoise.infosec.exchange.ap.brid.gy
GreyNoise Intel is now accessible via MCP! AI agents and SOCs can triage, respond, and monitor threats with real-time IP reputation + behavior tags. Automate remediation, reduce false positives, + prioritize active threats.

Learn more ➡️ […]
Original post on infosec.exchange
infosec.exchange
greynoise.infosec.exchange.ap.brid.gy
GreyNoise University LIVE is back from a little summer break and ready to dive into demos, events, updates + dad jokes. Catch up with us TOMORROW at 12 ET! 📺
https://www.greynoise.io/events/greynoise-university-live
GreyNoise University LIVE
www.greynoise.io
greynoise.infosec.exchange.ap.brid.gy
We're looking for some awesome folks to join our team!
If one of these roles catches your eye, we'd love to hear from you.

👩‍💻 greynoise.io/careers
We are hiring

Senior Software Engineer 
Head of US Federal Sales
RSM - US DoD + IC
RSM - US Enterprise
Sales Engineer - US DoD + IC

Apply now at greynoise.io/careers
greynoise.infosec.exchange.ap.brid.gy
See you soon! @hrbrmstr + Noah are bringing a jam-packed webinar getting into our most recent report, Early Warning Signals: When Attacker Activity Precedes New Vulns, you’ll definitely want to tune in. 📺 […]
Original post on infosec.exchange
infosec.exchange
greynoise.infosec.exchange.ap.brid.gy
GreyNoise observed two scanning surges against Cisco ASA devices in late August, both representing significant elevations above baseline. This activity led to the discovery of a botnet cluster solely scanning for Cisco ASA on August 26.

Full analysis […]
Original post on infosec.exchange
infosec.exchange
greynoise.infosec.exchange.ap.brid.gy
We survived August in the desert, with fresh insights on early warning signals, 73 new threat tags, + lots of upcoming events. Check out August's NoiseLetter for everything you need to know this month. ☀️
https://www.greynoise.io/resources/noiseletter-august-2025
NoiseLetter August 2025
Get GreyNoise updates! Read the August 2025 NoiseLetter for product news, key resources, the latest tags and vulnerabilities, and more.
www.greynoise.io
greynoise.infosec.exchange.ap.brid.gy
We’re honored that GreyNoise Intelligence was acknowledged in the latest joint cyber advisory from the NSA Cybersecurity Collaboration Center and partner agencies. Read the full advisory here […]

[Original post on infosec.exchange]
greynoise.infosec.exchange.ap.brid.gy
30,000+ IPs hit Microsoft Remote Desktop on Aug 24, a significant escalation from our original reporting of nearly 2,000 IPs on August 21. Full analysis: https://www.greynoise.io/blog/surge-malicious-ips-probe-microsoft-remote-desktop
#threatintel #rdp […]

[Original post on infosec.exchange]
greynoise.infosec.exchange.ap.brid.gy
On August 21, GreyNoise observed nearly 2,000 malicious IPs probing Microsoft Remote Desktop (RDP) services in a single day — a sharp deviation from baseline activity. Full blog […]

[Original post on infosec.exchange]