GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by GreyNoise (greynoise@infosec.exchange)

  1. Embed this notice
    GreyNoise (greynoise@infosec.exchange)'s status on Wednesday, 11-Feb-2026 08:28:18 JST GreyNoise GreyNoise

    We observed a 65% drop in global telnet traffic in a single hour on Jan 14, settling into a sustained 59% reduction. 18 ASNs went silent, 5 countries disappeared, but cloud providers were unaffected.

    Our analysis of 51.2M sessions points to backbone-level port 23 filtering by a North American Tier 1 transit provider.

    🔗 https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/

    #GreyNoise #ThreatIntel #CyberSecurity #InfoSec

    In conversation about 10 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.labs.greynoise.io
      2026-01-14: The Day the telnet Died – GreyNoise Labs
      from hrbrmstr & 🔮Orbie✨
      On January 14, 2026, global telnet traffic observed by GreyNoise sensors fell off a cliff. A 59% sustained reduction, eighteen ASNs going completely silent, five countries vanishing from our data entirely. Six days later, CVE-2026-24061 dropped. Coincidence is one explanation.
  2. Embed this notice
    GreyNoise (greynoise@infosec.exchange)'s status on Tuesday, 03-Feb-2026 04:38:39 JST GreyNoise GreyNoise

    In 2025, 59 CVEs quietly flipped to “known ransomware use” in CISA’s KEV...no alerts, no fanfare. 🧐

    We dug through a year of JSON to catch every silent flip and built an RSS feed so you don’t miss the next one.

    Read the blog + grab the feed 🗞️

    https://www.greynoise.io/blog/unmasking-cisas-hidden-kev-ransomware-updates

    In conversation about 18 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: cdn.prod.website-files.com
      The Noise in the Silence: Unmasking CISA's Hidden KEV Ransomware Updates
      In 2025, 59 KEV entries silently flipped to “known ransomware use.” GreyNoise uncovers the hidden flips, why they matter, and a new feed to track them.
  3. Embed this notice
    GreyNoise (greynoise@infosec.exchange)'s status on Thursday, 20-Nov-2025 06:09:27 JST GreyNoise GreyNoise

    🚨 Palo Alto GlobalProtect scanning surged 40X in 24hrs...a 90-day high.
    2.3M login attempts from concentrated infrastructure (AS200373/AS208885).
    Block these IPs now: https://www.greynoise.io/blog/palo-alto-scanning-surges-90-day-high

    In conversation about 3 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: cdn.prod.website-files.com
      Palo Alto Scanning Surges 40X in 24 Hours, Marking 90-Day High
      GreyNoise has identified a significant escalation in malicious activity targeting Palo Alto Networks GlobalProtect portals. Beginning on 14 November 2025, activity rapidly intensified, culminating in a 40x surge within 24 hours, marking a new 90-day high.
  4. Embed this notice
    GreyNoise (greynoise@infosec.exchange)'s status on Tuesday, 18-Nov-2025 05:59:20 JST GreyNoise GreyNoise

    EU sanctioned Stark Industries in May. Leaked docs gave them 12 days warning.

    Result: ASN shuffle, rebrand to THE.Hosting. Corporate shells changed, network behavior didn't.

    We tracked it: AS44477→AS209847. Packets don't lie.
    🔗 https://www.greynoise.io/blog/stark-industries-shell-game

    In conversation about 3 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: cdn.prod.website-files.com
      The Stark Industries Shell Game - When Bulletproof Hosting Proves Bulletproof
      EU sanctions hit Stark Industries in May 2025. GreyNoise data shows how the group quietly rebranded to THE.Hosting and kept its malicious infrastructure running.
  5. Embed this notice
    GreyNoise (greynoise@infosec.exchange)'s status on Thursday, 02-Oct-2025 07:15:15 JST GreyNoise GreyNoise

    GreyNoise now has coverage for Cisco zero-days CVE-2025-20333 and CVE-2025-20362. Watch for exploit attempts in real-time:CVE-2025-20333
    (Net-new): https://viz.greynoise.io/tags/cisco-asa-vpn-input-validation-cve-2025-20333-rce-attempt?days=1CVE-2025-20362
    (Updated tag): https://viz.greynoise.io/tags/cisco-asa-directory-traversal-cve-2018-0296-and-cve-2025-20362-attempt

    #CiscoASA #Cisco #ZeroDay #CiscoZeroDays #CVE202520333 #CVE202520362 #GreyNoise #ThreatIntel

    In conversation about 5 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: viz.greynoise.io
      GreyNoise Visualizer | GreyNoise Visualizer
      At GreyNoise, we collect and analyze untargeted, widespread, and opportunistic scan and attack activity that reaches every server directly connected to the Internet.
    2. Domain not in remote thumbnail source whitelist: viz.greynoise.io
      GreyNoise Visualizer | GreyNoise Visualizer
      At GreyNoise, we collect and analyze untargeted, widespread, and opportunistic scan and attack activity that reaches every server directly connected to the Internet.
  6. Embed this notice
    GreyNoise (greynoise@infosec.exchange)'s status on Saturday, 17-May-2025 02:40:04 JST GreyNoise GreyNoise

    Two critical Ivanti zero-days (CVE-2025-4427 + CVE-2025-4428) are now being actively exploited after a surge in scanning activity last month. Immediate patching is required. Get more details here ⬇️ https://www.greynoise.io/blog/ivanti-epmm-zero-days-reconnaissance-exploitation
    #ZeroDay #CyberSecurity #threatintel

    In conversation about 9 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/518/471/220/723/020/original/c3b5c5b4674c1b28.png
    2. Domain not in remote thumbnail source whitelist: cdn.prod.website-files.com
      Ivanti EPMM Zero-Days: Reconnaissance to Exploitation
      Two critical Ivanti zero-days (CVE-2025-4427 and CVE-2025-4428) are now being actively exploited after a surge in scanning activity last month. When chained together, these vulnerabilities enable unauthenticated remote code execution on Ivanti Endpoint Manager Mobile systems.
  7. Embed this notice
    GreyNoise (greynoise@infosec.exchange)'s status on Friday, 25-Apr-2025 17:29:07 JST GreyNoise GreyNoise

    🚨 9X Surge in Scanning for Ivanti Connect Secure. No CVEs are tied to this yet, but patterns like this often precede exploitation. Full analysis + suspicious IPs: https://www.greynoise.io/blog/surge-ivanti-connect-secure-scanning-activity #Ivanti #Cybersecurity #Scanning

    In conversation about 10 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: cdn.prod.website-files.com
      9X Surge in Ivanti Connect Secure Scanning Activity
      GreyNoise observed a 9X spike in suspicious scanning activity targeting Ivanti Connect Secure or Ivanti Pulse Secure VPN systems. More than 230 unique IPs probed ICS/IPS endpoints. This surge may indicate coordinated reconnaissance and possible preparation for future exploitation.
  8. Embed this notice
    GreyNoise (greynoise@infosec.exchange)'s status on Friday, 28-Mar-2025 06:36:42 JST GreyNoise GreyNoise
    • Horizon3.ai

    🚨 New GreyNoise Tag Alert: We've added a fresh tag tracking CrushFTP Authentication Bypass (CVE-2025-2825) exploitation attempts. Thanks to @horizon3ai for the intel! Dive into the details: https://viz.greynoise.io/tags/crushftp-authentication-bypass-cve-2025-2825-attempt

    In conversation about a year ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: viz.greynoise.io
      GreyNoise Visualizer
      At GreyNoise, we collect and analyze untargeted, widespread, and opportunistic scan and attack activity that reaches every server directly connected to the Internet.
  9. Embed this notice
    GreyNoise (greynoise@infosec.exchange)'s status on Thursday, 13-Mar-2025 05:44:15 JST GreyNoise GreyNoise

    🚨 March 12 UPDATE: Grafana Exploitation May Signal Multi-Phase SSRF Attacks. Update + original analysis: https://www.greynoise.io/blog/new-ssrf-exploitation-surge #Cybersecurity #GreyNoise #Vulnerability

    In conversation about a year ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: cdn.prod.website-files.com
      New SSRF Exploitation Surge Serves as a Reminder of 2019 Capital One Breach
      GreyNoise observed 400+ IPs exploiting multiple SSRF vulnerabilities across various platforms, with recent activity concentrated in Israel and the Netherlands.
  10. Embed this notice
    GreyNoise (greynoise@infosec.exchange)'s status on Wednesday, 29-Jan-2025 05:11:57 JST GreyNoise GreyNoise

    🚨 Hackers Are Exploiting Fortinet Firewalls 🚨
    15k+ FortiGate firewalls were breached via CVE-2022-40684. GreyNoise has spotted 366 compromised devices behaving abnormally. Defenders: Patch now, secure your systems, and check your IPs.

    https://www.greynoise.io/blog/hackers-actively-exploiting-fortinet-firewalls-real-time-insights-from-greynoise

    In conversation about a year ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/907/770/149/546/063/original/3d85b319fc4d6966.png
    2. Domain not in remote thumbnail source whitelist: cdn.prod.website-files.com
      Hackers Actively Exploiting Fortinet Firewalls: Real-Time Insights from GreyNoise | GreyNoise Blog
      Discover how attackers are exploiting Fortinet FortiGate firewalls in real time. Get critical insights into malicious activities tied to CVE-2022-40684, helping defenders identify, track, and respond to threats effectively.
  11. Embed this notice
    GreyNoise (greynoise@infosec.exchange)'s status on Saturday, 10-Feb-2024 06:03:13 JST GreyNoise GreyNoise

    We believe the public PoC for for CVE-2020-3580 XSS affecting Cisco ASA and FTD may be being utilized to curate a list of IP's that are likely to be vulnerable to CVE-2020-3259, an unauthenticated memory disclosure vulnerability, recently attributed to Akira ransomware.

    https://viz.greynoise.io/tag/cisco-asa-xss-attempt?days=30

    In conversation Saturday, 10-Feb-2024 06:03:13 JST from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/111/903/422/912/637/950/original/0bed12921fd4cfc9.png

User actions

    GreyNoise

    GreyNoise

    GreyNoise analyzes Internet background noise. Use GreyNoise to remove pointless security alerts, find compromised devices, or identify emerging threats.(Yes, it's really us. - Love, GreyNoise )

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          239158
          Member since
          30 Jan 2024
          Notices
          11
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.