GreyNoise's Avatar

GreyNoise

@greynoise.io

GreyNoise analyzes Internet background noise. Use GreyNoise to remove pointless security alerts, find compromised devices, or identify emerging threats.

4,078
Followers
24
Following
402
Posts
18.07.2023
Joined
Posts Following

Latest posts by GreyNoise @greynoise.io

Preview
NoiseLetter February 2026 Get GreyNoise updates! Read the February 2026 NoiseLetter for product news, key resources, the latest tags and vulnerabilities, and more.

February was anything but quiet at GreyNoise, from our 2026 State of the Edge Report to new edge attack research, Ivanti + BeyondTrust deep dives, and a packed March of events, check it all out in this month's Noiseletter! πŸš€

05.03.2026 20:02 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
GreyNoise Intelligence Is Available Across the CrowdStrike Falcon Platform GreyNoise intelligence is now available across the CrowdStrike Falcon platform, bringing internet-wide scanning context to SIEM queries, SOAR workflows, and AI-driven triage.

GreyNoise is now integrated across CrowdStrike Falcon. πŸš€

Falcon users can bring GreyNoise IP classification into Next-Gen SIEM searches, Fusion SOAR playbooks, and Charlotte AI workflows to triage faster, cut background noise + prioritize real threats.

04.03.2026 22:33 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
A GreyNoise Intelligence Weekly Intelligence Brief cover page titled β€œWeekly Intelligence Brief” with the subhead β€œThe Scanning Landscape Collapsed. Enterprise Campaigns Intensified.” The design features large bold statistics across the center, including β€œ268M sessions observed,” β€œ435% Sophos surge,” β€œ9.1M RDP sessions,” and β€œWeek 6 VPN siege.” Supporting text summarizes key findings about collapsing global scanning volume, intensified Sophos firewall exploitation, massive RDP scanning from two IPs, and ongoing VPN credential campaigns targeting enterprise perimeter infrastructure. The footer includes a call to action to contact GreyNoise for the full brief, the GreyNoise logo, and the company website and social handle on a clean, professional white background with branded typography.

A GreyNoise Intelligence Weekly Intelligence Brief cover page titled β€œWeekly Intelligence Brief” with the subhead β€œThe Scanning Landscape Collapsed. Enterprise Campaigns Intensified.” The design features large bold statistics across the center, including β€œ268M sessions observed,” β€œ435% Sophos surge,” β€œ9.1M RDP sessions,” and β€œWeek 6 VPN siege.” Supporting text summarizes key findings about collapsing global scanning volume, intensified Sophos firewall exploitation, massive RDP scanning from two IPs, and ongoing VPN credential campaigns targeting enterprise perimeter infrastructure. The footer includes a call to action to contact GreyNoise for the full brief, the GreyNoise logo, and the company website and social handle on a clean, professional white background with branded typography.

Here's a taste of what GreyNoise customers got in this week's At The Edge intelligence brief.

268M sessions. 540K unique IPs. Four findings that matter.

Full brief: IOCs, attribution, recommendations.

πŸ”— www.greynoise.io/resources/at...

greynoise.io/contact

04.03.2026 19:48 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Noise: analyzed.
Security: certified.

GreyNoise is now ISO 27001 certified πŸ”
We spend our days tracking internet background noise and we hold ourselves to the same high security standards we expect from the ecosystem.

02.03.2026 19:54 πŸ‘ 6 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Active Reconnaissance Campaign Targets SonicWall Firewalls Through Commercial Proxy Infrastructure 84,000+ scanning sessions targeting SonicWall SonicOS infrastructure in four days. GreyNoise details a coordinated reconnaissance campaign using rotating proxy infrastructure.

GreyNoise observed a coordinated campaign probing SonicWall firewalls to identify which devices have SSL VPN enabled β€” the prerequisite step before credential attacks. 4️⃣ infrastructure clusters, a commercial proxy service rotating thousands of IPs, and near-zero exploitation. This is target mapping.

27.02.2026 19:07 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
What’s That String? That Time a Weird String Revealed a Whole Operation – GreyNoise Labs One weird payload turned out to be a loose thread on an active hacking operation.

πŸ•΅ What started as a simple "Hey, I keep seeing this string. Any ideas?" message kicked off an investigation finding a cryptostealing and database wiping operation.

Follow the string in the latest GreyNoise Labs post: www.labs.greynoise.io/grimoire/202...

26.02.2026 19:42 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
GreyNoise University LIVE

Join us today at 12pm ET for February’s GreyNoise University LIVE session, where you’ll get an overview of what’s new at GreyNoise, plus a live demo of our tools and latest product releases.

26.02.2026 15:04 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
2026 State of the Edge Report GreyNoise observed 212 exploitation attempts per second in H2 2025. The 2026 State of the Edge Report reveals attack patterns, exposes defense gaps, and prioritizes what to fix.

52% of RCE attempts came from IPs with no prior GreyNoise history. New research on where edge defenses fall short + what to do about it.

#ThreatIntel #Cybersecurity #GreyNoise

24.02.2026 14:18 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
A GreyNoise Intelligence weekly brief cover page titled β€œWeekly Intelligence Brief” for February 9–16, 2026, using a clean corporate layout with the GreyNoise logo at the top. Large headline text reads β€œIoT, Edge, Credentials. All Surging at Once.” followed by a short summary paragraph describing rising IoT botnet recruitment, Fortinet VPN brute-forcing, and credential harvesting. Four bold numeric callouts highlight β€œ91% IoT default password surge,” β€œ98% increase Fortinet VPN brute-force,” β€œ8.28M credential harvesting sessions,” and β€œ84 days of crypto C2 beaconing.” Below, four brief section teasers describe IoT botnet activity, enterprise edge credential attacks, broad credential harvesting, and an 84-day crypto exchange C2 operation. The footer includes a β€œWant the full brief?” marketing call-to-action with the GreyNoise contact URL and social handle, plus a β€œTLP: CLEAR” label indicating public sharing is allowed.

A GreyNoise Intelligence weekly brief cover page titled β€œWeekly Intelligence Brief” for February 9–16, 2026, using a clean corporate layout with the GreyNoise logo at the top. Large headline text reads β€œIoT, Edge, Credentials. All Surging at Once.” followed by a short summary paragraph describing rising IoT botnet recruitment, Fortinet VPN brute-forcing, and credential harvesting. Four bold numeric callouts highlight β€œ91% IoT default password surge,” β€œ98% increase Fortinet VPN brute-force,” β€œ8.28M credential harvesting sessions,” and β€œ84 days of crypto C2 beaconing.” Below, four brief section teasers describe IoT botnet activity, enterprise edge credential attacks, broad credential harvesting, and an 84-day crypto exchange C2 operation. The footer includes a β€œWant the full brief?” marketing call-to-action with the GreyNoise contact URL and social handle, plus a β€œTLP: CLEAR” label indicating public sharing is allowed.

This week's At the Edge: CLEAR is out β€” a preview of the intel brief GreyNoise customers get every week.

πŸ”— www.greynoise.io/resources/at...

That's just the preview. greynoise.io/contact

#ThreatIntel #CyberSecurity #GreyNoise

18.02.2026 19:40 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Reconnaissance Has Begun for the New BeyondTrust RCE (CVE-2026-1731): Here's What We See So Far A PoC for CVE-2026-1731 hit GitHub on Feb 10. Within 24 hours, GreyNoise observed reconnaissance probing for vulnerable BeyondTrust instances.

It took less than a day. A PoC for BeyondTrust CVE-2026-1731 hit GitHub, and GreyNoise immediately started seeing reconnaissance from multi-exploit actors hiding behind VPNs + custom tooling. See what our data reveals about who’s mapping targets + how.

12.02.2026 18:13 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 1
A dark-themed β€œWeekly Intelligence Brief” report from GreyNoise covering February 2–9, 2026, summarizing global malicious scanning activity. Large headline text highlights a 113% week‑over‑week surge in Remote Desktop Protocol (RDP) attacks, with 29.9 million RDP attempts, 83,000 N8N exploits, and 352 callback domains associated with OAST. Below, the layout is divided into four sections: one explaining that RDP attacks more than doubled in a week driven by a single noisy IP; one titled β€œIvanti β€˜Three‑Headed Hydra’” describing three independent campaigns abusing CVE‑2022‑1281 with Cobalt Strike; one on N8N exploitation describing 83,334 attempts against CVE‑2022‑21858 from a specific IP range and warning about exposed API keys; and one on the Rondodx botnet summarizing high session counts and links to previous activity. A footer invites readers to contact GreyNoise for the full brief and includes a link to the company website.

A dark-themed β€œWeekly Intelligence Brief” report from GreyNoise covering February 2–9, 2026, summarizing global malicious scanning activity. Large headline text highlights a 113% week‑over‑week surge in Remote Desktop Protocol (RDP) attacks, with 29.9 million RDP attempts, 83,000 N8N exploits, and 352 callback domains associated with OAST. Below, the layout is divided into four sections: one explaining that RDP attacks more than doubled in a week driven by a single noisy IP; one titled β€œIvanti β€˜Three‑Headed Hydra’” describing three independent campaigns abusing CVE‑2022‑1281 with Cobalt Strike; one on N8N exploitation describing 83,334 attempts against CVE‑2022‑21858 from a specific IP range and warning about exposed API keys; and one on the Rondodx botnet summarizing high session counts and links to previous activity. A footer invites readers to contact GreyNoise for the full brief and includes a link to the company website.

Three campaigns. One has Cobalt Strike ready.

RDP nearly quadrupled. A botnet picked up a new CVE. And someone built a Kubernetes cluster just to exploit n8n.

A preview of what GreyNoise customers get every week. Full brief has the IOCs, attribution, and analysis.

11.02.2026 21:24 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
2026-01-14: The Day the telnet Died – GreyNoise Labs On January 14, 2026, global telnet traffic observed by GreyNoise sensors fell off a cliff. A 59% sustained reduction, eighteen ASNs going completely silent, five countries vanishing from our data enti...

We observed a 65% drop in global telnet traffic in 1 hour on Jan 14, settling into a sustained 59% reduction. 18 ASNs went silent, 5 countries disappeared, but cloud providers were unaffected.

Our analysis of 51.2M sessions points to backbone-level port 23 filtering by a Tier 1 transit provider.

10.02.2026 20:43 πŸ‘ 7 πŸ” 6 πŸ’¬ 0 πŸ“Œ 0
Preview
Active Ivanti Exploitation Traced to Single Bulletproof IPβ€”Published IOC Lists Point Elsewhere The GreyNoise Global Observation Grid observed active exploitation of two critical Ivanti Endpoint Manager Mobile vulnerabilities, and 83% of that exploitation traces to a single IP address on bulletp...

83% of observed Ivanti EPMM exploitation (CVE-2026-1281) traces to one bulletproof IP that isn't on any published IOC list. The IPs that are? VPN exits with zero Ivanti activity. We broke down who's actually doing this ⬇️

#Ivanti #ThreatIntel #CVE20261281 #InfoSec

10.02.2026 19:17 πŸ‘ 5 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Preview
The AI-Accelerated Threat Landscape: Four Steps Toward Active Defense at Machine SpeedΒ  - Government Technology Insider IfΒ you’veΒ been following breaking news in cybersecurity, it will come as no surprise to you that AI is allowing attackers to move faster and at a greater scale than traditional defenses can keep up wi...

Attackers are operating at machine speed + so should defenders. πŸ€–

Check out the Government Technology Insider article, where our Principal Intelligence Liaison, Shawn Smagh, shares what we’re seeing in the data and 4️⃣ steps to get to active defense at machine speed.

10.02.2026 16:25 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

Check out this month's NoiseLetter for the latest on Ghostie + all things GreyNoise!
πŸ—žοΈ www.greynoise.io/resources/no...

04.02.2026 22:35 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
React Server Components Exploitation Consolidates as Two IPs Generate Majority of Attack Traffic Two months after CVE-2025-55182 was disclosed on December 3, 2025, exploitation activity targeting React Server Components has consolidated significantly.

Two IPs now generate 56% of all CVE-2025-55182 exploitation traffic.

One deploys cryptominers. The other opens reverse shells.

We dug into the infrastructure. What we found goes back to 2020.

03.02.2026 21:04 πŸ‘ 5 πŸ” 5 πŸ’¬ 0 πŸ“Œ 0
Preview
The Noise in the Silence: Unmasking CISA's Hidden KEV Ransomware Updates In 2025, 59 KEV entries silently flipped to β€œknown ransomware use.” GreyNoise uncovers the hidden flips, why they matter, and a new feed to track them.

In 2025, 59 CVEs quietly flipped to β€œknown ransomware use” in CISA’s KEV...no alerts, no fanfare. 🧐

We dug through a year of JSON to catch every silent flip and built an RSS feed so you don’t miss the next one.

Read the blog + grab the feed πŸ—žοΈ

02.02.2026 19:32 πŸ‘ 4 πŸ” 1 πŸ’¬ 0 πŸ“Œ 1
Preview
Inside the Infrastructure: Who’s Scanning for Ivanti Connect Secure? – GreyNoise Labs GreyNoise detected a 100x surge in Ivanti Connect Secure reconnaissance targeting CVE-2025-0282 (EPSS 93%). Analysis reveals two distinct campaigns: an aggressive AS213790-based operation generating 3...

πŸ‘€ Seeing who’s poking Ivanti Connect Secure?

GreyNoise just caught a ~100x spike in recon on CVE-2025-0282 featuring one loud AS213790 campaign and one sneaky botnet spread across 6K IPs.

We broke down the infra + what defenders should do next. πŸ‘‡

29.01.2026 17:25 πŸ‘ 8 πŸ” 5 πŸ’¬ 1 πŸ“Œ 0
Preview
GreyNoise University LIVE

Join us tomorrow at 12 ET for 2026's first GreyNoise University LIVE! With a new co-host, David! Looking forward to seeing you there. πŸͺ©

28.01.2026 21:28 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
GreyNoise Introduces Recall: Time-Series Intelligence for GreyNoise Query Language Recall is a time-series capability that enables customers to query GreyNoise data over specific historical ranges. Instead of a static summary of current IP behavior, Recall allows you to see exactly ...

Most attacker behavior only makes sense over time. πŸ•°οΈ
Recall brings time-series analysis to GNQL so you can see how scanning and exploitation evolved.
See the timeline. Find the pattern.

28.01.2026 19:02 πŸ‘ 5 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
A digital intelligence brief from GreyNoise titled β€œAT THE EDGE,” dated January 19–23, 2026, summarizing three coordinated cyber campaigns under the headline β€œThree Campaigns. One Fingerprint.” The top of the graphic highlights key statistics in large text: 1.7M React attacks, 506K VPN targets, 1.8M router attempts, and a note that 3 IPs are responsible for 99% of observed activity. Below, four text blocks describe: (1) React exploitation attempts related to CVE-2025-55182, including real command injection, a Metasploit module, and one hosting provider generating 57% of traffic; (2) sustained attacks on enterprise VPNs (Fortinet SSL VPN and Palo Alto GlobalProtect) with 506K sessions, a 25% increase over baseline for Fortinet, and emphasis that VPN credentials are valuable for ransomware; (3) router attacks where three IPs drive 1.8M attempts, focusing on a MikroTik RouterOS brute-force campaign with a 64,000:1 session-to-IP ratio and noting compromised routers as pivot points and botnet nodes; and (4) an explanation that a shared JA1T network fingerprint links the React RCE, VPN brute force, and environment crawling to common infrastructure, suggesting organized operations rather than random scanning. The bottom banner invites GreyNoise customers to access the full brief, mentioning complete IOCs, attribution, detection guidance, and weekly role-based recommendations, with a contact URL β€œgreynoise.io/contact” and a small 2026 GreyNoise, Inc. copyright notice.

A digital intelligence brief from GreyNoise titled β€œAT THE EDGE,” dated January 19–23, 2026, summarizing three coordinated cyber campaigns under the headline β€œThree Campaigns. One Fingerprint.” The top of the graphic highlights key statistics in large text: 1.7M React attacks, 506K VPN targets, 1.8M router attempts, and a note that 3 IPs are responsible for 99% of observed activity. Below, four text blocks describe: (1) React exploitation attempts related to CVE-2025-55182, including real command injection, a Metasploit module, and one hosting provider generating 57% of traffic; (2) sustained attacks on enterprise VPNs (Fortinet SSL VPN and Palo Alto GlobalProtect) with 506K sessions, a 25% increase over baseline for Fortinet, and emphasis that VPN credentials are valuable for ransomware; (3) router attacks where three IPs drive 1.8M attempts, focusing on a MikroTik RouterOS brute-force campaign with a 64,000:1 session-to-IP ratio and noting compromised routers as pivot points and botnet nodes; and (4) an explanation that a shared JA1T network fingerprint links the React RCE, VPN brute force, and environment crawling to common infrastructure, suggesting organized operations rather than random scanning. The bottom banner invites GreyNoise customers to access the full brief, mentioning complete IOCs, attribution, detection guidance, and weekly role-based recommendations, with a contact URL β€œgreynoise.io/contact” and a small 2026 GreyNoise, Inc. copyright notice.

Three campaigns. One fingerprint.
React RCE, VPN brute forcing, and router scanningβ€”all linked to the same infrastructure.β†’ 1.7M React attacks
β†’ 506K VPN targets
β†’ 3 IPs behind 1.8M router attempts
This week's At The Edge preview: greynoise.io/contact

27.01.2026 22:33 πŸ‘ 5 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Post image

Check out @hrbrmstr.dev today on @huntress.com's Tradecraft Tuesday at 1pm ET to chat about all things #React2Shell. 🀘

πŸ”— www.huntress.com/upcoming-web...

13.01.2026 16:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Filtering Noise in (Cyber)Space Dive into the scientific methods GreyNoise uses to separate internet noise from real threats, providing defenders a clearer, more accurate view of malicious activity.

New on the GreyNoise blog: We borrow from some unexpected fields, enzyme kinetics, species biodiversity models, astrophotography, to understand internet-wide scanning activity and measure what we might be missing.

#GreyNoise #Cybersecurity

12.01.2026 21:14 πŸ‘ 5 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Black GreyNoise hiring graphic with bold text reading β€˜We Are Hiring!’ followed by a list of open roles: Director of Strategic Alliances; Regional Sales Manager – US DoD + IC; Sales Engineer – US DoD + IC; Regional Sales Manager – US Federal Civilian; Sales Development Representative – EMEA; and Customer Experience Specialist – EMEA. The design features teal wave lines and the GreyNoise logo, with a call to action to apply at greynoise.io/careers.

Black GreyNoise hiring graphic with bold text reading β€˜We Are Hiring!’ followed by a list of open roles: Director of Strategic Alliances; Regional Sales Manager – US DoD + IC; Sales Engineer – US DoD + IC; Regional Sales Manager – US Federal Civilian; Sales Development Representative – EMEA; and Customer Experience Specialist – EMEA. The design features teal wave lines and the GreyNoise logo, with a call to action to apply at greynoise.io/careers.

🚨 We are hiring across sales, alliances, and customer experience for our US + EMEA teams 🌍

See a role you'd crush? We would love to hear from you!

πŸ‘‰ Apply now: greynoise.io/careers

#hiring #cybersecuritycareers

12.01.2026 15:59 πŸ‘ 4 πŸ” 1 πŸ’¬ 0 πŸ“Œ 1
Preview
Threat Actors Actively Targeting LLMs Our Ollama honeypot infrastructure captured 91,403 attack sessions between October 2025 and January 2026. Buried in that data: two distinct campaigns that reveal how threat actors are systematically m...

GreyNoise analyzed activity targeting exposed Ollama and LLM infrastructure, identifying SSRF abuse attempts and large-scale probing of LLM model endpoints.
#GreyNoise #ThreatIntelligence #LLMSecurity

08.01.2026 19:58 πŸ‘ 4 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Post image

All internet traffic from Iran ceased in @greynoise.io one hour ago. Tier 1 dropped off two hours ago.

08.01.2026 19:56 πŸ‘ 14 πŸ” 8 πŸ’¬ 0 πŸ“Œ 1
Preview
The Ransomware Ground Game: How A Christmas Scanning Campaign Will Fuel 2026 Attacks Over four days in December, one operator scanned the internet with 240+ exploits, logging confirmed vulnerabilities that could power targeted intrusions in 2026.

Ransomware starts with reconnaissance: we observed a recent large-scale scanning campaign validating exploitable systems, data that feeds the initial access market and shows up later in real attacks. πŸ•΅οΈβ€β™€οΈ

#GreyNoise #Ransomware #InitialAccess #IAB #Recon

08.01.2026 15:03 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Preview
NoiseLetter December 2025 Get GreyNoise updates! Read the December 2025 NoiseLetter for product news, key resources, the latest tags and vulnerabilities, and more.

Back from the holidays and afraid to open your inbox? Same. Open the latest NoiseLetter instead.

07.01.2026 17:01 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CVE-2025-55182 (React2Shell) Opportunistic Exploitation In The Wild: What The GreyNoise Observation Grid Is Seeing So Far GreyNoise is already seeing opportunistic, largely automated exploitation attempts consistent with the newly disclosed React Server Components (RSC) β€œFlight” protocol RCEβ€”often referred to publicly as...

React2Shell Update – 7 January 2026
Full update & analysis ⬇️
#GreyNoise #React2Shell

07.01.2026 15:02 πŸ‘ 4 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Post image

New year, new opportunities? Check out our current openings for a new start in the new year! πŸͺ©πŸŽ‰

πŸ”— greynoise.io/careers

31.12.2025 17:48 πŸ‘ 4 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0