???? Live from the Australian Information Security Association (AISA) Cyber Conference?in Canberra, Australia! It's been an incredible few days and we're grateful for the important, challenging work being done across the entire security industry. It's never been more important to consider the far-reaching impacts of cybersecurity, and we couldn't be prouder of the research and product innovation work our teams are doing all over the globe. Thanks to everyone we got to connect with, and cheers to our giveaway winners!
Censys
计算机和网络安全
Ann Arbor,Michigan 12,752 位关注者
The Leading Internet Intelligence Platform for Threat Hunting and Attack Surface Management
关于我们
Censys is the one place to understand everything on the internet. We have built and operate the world’s largest internet scanning infrastructure and we empower organizations, individuals and security researchers by providing unparalleled visibility into the global internet landscape. We see more of the internet than anyone else, which gives us the most comprehensive internet visibility in the world. Our two main use cases are attack surface management and threat hunting with so many more on the horizon. Through our comprehensive internet data, we strive to enhance cybersecurity, facilitate data-driven decision-making, and reduce internet exposures for commercial and government organizations across the globe.
- 网站
-
www.censys.com
Censys的外部链接
- 所属行业
- 计算机和网络安全
- 规模
- 51-200 人
- 总部
- Ann Arbor,Michigan
- 类型
- 私人持股
- 创立
- 2017
- 领域
- Cyber Security、Data、ZMap、Data-driven Security、Internet、Attack Surface Management和Vulnerability Management
地点
Censys员工
动态
-
?? New data on mass exploitation activity shows that many attackers are targeting older, known vulnerabilities–many of them more than five years old. Check out the research team's new blog, "On the Internet, Everything Old is Exploitable Again". https://lnkd.in/daWeASYw
-
Last week, we shared the first in a short blog series from the Censys research teams, who set out to test the existence of ICS protocols on port tweaks. Based on our platform data, we had a hunch that some ICS protocols were more likely to be responsive on port tweaks than others, so instead of picking one ICS protocol as a proof-of-concept analysis, we set out to investigate all of them. ??? Read "Investigating the Vast World of ICS Coverage: Part 2" here: https://lnkd.in/gJNaadjE
-
Did you miss Censys at FS-ISAC Spring Americas Summit? Check out?the Swiss Life story?to see what all the buzz was about! https://lnkd.in/g4BN_JU6
-
Censys will be at the 2025 Health-ISAC APAC Summit in Kuala Lumpur, Malaysia March 18-20, 2025. We're excited to share with and learn from experts in the security community focused on strengthening the resiliency of the global health sector.
-
-
?? Have you received a "toll road" text recently? Censys researcher Aidan Holland sat down with CNBC to share his own research into the massive text scam, why users are being targeted, and how to protect your personal data. ??Read the full story here: https://lnkd.in/d3qDtHaj
-
Censys转发了
?? Critical National Infrastructure Exposures.... ?? In the latest Censys "State of the Internet Report" highlights the exposure of infrastructure and the risks involved especially in a heighted geopolitical state. Listen to our full podcast episode here: https://lnkd.in/eYverx_S Download the Censys report here: https://lnkd.in/eE5eF5MN #cybersecurity #cybervigilance #censys #attacksurfacemanagement
-
Earlier this month, the U.S. Department of Justice unsealed indictments against 12 Chinese nationals, many of whom they allege are part of APT27, also known as Silk Typhoon. The men are alleged to have been involved in attacks on the Department of Treasury, other government agencies, and other victims. Censys researcher ?? Silas Cutler joins Dennis Fisher to discuss the Silk Typhoon indictments and what it means for threat actors and researchers. https://lnkd.in/gYXuqaCw
The Big Story: Silk Typhoon
https://www.youtube.com/
-
SOC teams are spending too much time reacting to alerts instead of preventing attacks. Forrester’s 2025 report explains how external threat intelligence helps security teams: ??? Find and fix vulnerabilities before they’re exploited ?? Prioritize threats based on real-world impact ?? Move from firefighting to proactive security Censys is helping to deliver high-fidelity threat intelligence that enhances security teams’ visibility, readiness, and response. Access the full report for the latest insights on external threat intelligence and see why Censys was named among notable providers. https://lnkd.in/g25hhwsC