GreyNoise

GreyNoise analyzes Internet background noise. Use GreyNoise to remove pointless security alerts, find compromised devices, or identify emerging threats.

(Yes, it's really us. - Love, GreyNoise )

2026-02-04

Check out this month's NoiseLetter for the latest on Ghostie + all things GreyNoise!
πŸ—žοΈgreynoise.io/resources/noisele

2026-02-03

Two IPs now generate 56% of all CVE-2025-55182 exploitation traffic.

One deploys cryptominers. The other opens reverse shells.

We dug into the infrastructure. What we found goes back to 2020.

greynoise.io/blog/react2shell-

2026-02-02

In 2025, 59 CVEs quietly flipped to β€œknown ransomware use” in CISA’s KEV...no alerts, no fanfare. 🧐

We dug through a year of JSON to catch every silent flip and built an RSS feed so you don’t miss the next one.

Read the blog + grab the feed πŸ—žοΈ

greynoise.io/blog/unmasking-ci

2026-01-29

πŸ‘€ Seeing who’s poking Ivanti Connect Secure?

GreyNoise just caught a ~100x spike in recon on CVE-2025-0282 featuring one loud AS213790 campaign and one sneaky botnet spread across 6K IPs.

We broke down the infra + what defenders should do next. πŸ‘‡
labs.greynoise.io/grimoire/202

2026-01-28

Join us tomorrow at 12 ET for 2026's first GreyNoise University LIVE! With a new co-host, David! Looking forward to seeing you there. πŸͺ©greynoise.io/events/greynoise-

2026-01-28

Most attacker behavior only makes sense over time. πŸ•°οΈ
Recall brings time-series analysis to GNQL so you can see how scanning and exploitation evolved.
See the timeline. Find the pattern. greynoise.io/blog/recall-time-

2026-01-27

Three campaigns. One fingerprint.
React RCE, VPN brute forcing, and router scanningβ€”all linked to the same infrastructure.β†’ 1.7M React attacks
β†’ 506K VPN targets
β†’ 3 IPs behind 1.8M router attempts
This week's At The Edge preview: greynoise.io/contact

A digital intelligence brief from GreyNoise titled β€œAT THE EDGE,” dated January 19–23, 2026, summarizing three coordinated cyber campaigns under the headline β€œThree Campaigns. One Fingerprint.” The top of the graphic highlights key statistics in large text: 1.7M React attacks, 506K VPN targets, 1.8M router attempts, and a note that 3 IPs are responsible for 99% of observed activity. Below, four text blocks describe: (1) React exploitation attempts related to CVE-2025-55182, including real command injection, a Metasploit module, and one hosting provider generating 57% of traffic; (2) sustained attacks on enterprise VPNs (Fortinet SSL VPN and Palo Alto GlobalProtect) with 506K sessions, a 25% increase over baseline for Fortinet, and emphasis that VPN credentials are valuable for ransomware; (3) router attacks where three IPs drive 1.8M attempts, focusing on a MikroTik RouterOS brute-force campaign with a 64,000:1 session-to-IP ratio and noting compromised routers as pivot points and botnet nodes; and (4) an explanation that a shared JA1T network fingerprint links the React RCE, VPN brute force, and environment crawling to common infrastructure, suggesting organized operations rather than random scanning. The bottom banner invites GreyNoise customers to access the full brief, mentioning complete IOCs, attribution, detection guidance, and weekly role-based recommendations, with a contact URL β€œgreynoise.io/contact” and a small 2026 GreyNoise, Inc. copyright notice.
GreyNoise boosted:
2026-01-14

The first runZero Hour of 2026 is almost here! πŸš€

Join hosts Rob King and @todb on January 21 as they talk all things OT security with guest Brianna Cluck from @greynoise.

πŸ› οΈ Brianna will provide the blueprint to set up your own ICS home lab.

πŸ”Ž Rob will share his insights from the freshest OT research.

🚨 And of course, no episode would be complete without a Rapid Response Roundup, dissecting this month's notable vulnerabilities.

πŸ”— Register now: runzero.com/research/runzero-h

GreyNoise boosted:
hrbrmstr πŸ‡ΊπŸ‡¦ πŸ‡¬πŸ‡± πŸ‡¨πŸ‡¦hrbrmstr
2026-01-13

Later today the epic @huntress team lets me crash the party to talk all things React2Shell.

Still time to reg!

Rly looking fwd to it. Tis not often one gets to meet ones heroes!

huntress.com/upcoming-webinars

banner
2026-01-12

New on the GreyNoise blog: We borrow from some unexpected fields, enzyme kinetics, species biodiversity models, astrophotography, to understand internet-wide scanning activity and measure what we might be missing.

greynoise.io/blog/filtering-no

#GreyNoise #Cybersecurity

2026-01-12

🚨 We are hiring across sales, alliances, and customer experience for our US + EMEA teams 🌍

See a role you'd crush? We would love to hear from you!

πŸ‘‰ Apply now: greynoise.io/careers

#hiring #cybersecuritycareers

Black GreyNoise hiring graphic with bold text reading β€˜We Are Hiring!’ followed by a list of open roles: Director of Strategic Alliances; Regional Sales Manager – US DoD + IC; Sales Engineer – US DoD + IC; Regional Sales Manager – US Federal Civilian; Sales Development Representative – EMEA; and Customer Experience Specialist – EMEA. The design features teal wave lines and the GreyNoise logo, with a call to action to apply at greynoise.io/careers.
2026-01-08

GreyNoise analyzed activity targeting exposed Ollama and LLM infrastructure, identifying SSRF abuse attempts and large-scale probing of LLM model endpoints.
Analysis: greynoise.io/blog/threat-actor
#GreyNoise #ThreatIntelligence #LLMSecurity

2026-01-08

Ransomware starts with reconnaissance: we observed a recent large-scale scanning campaign validating exploitable systems, data that feeds the initial access market and shows up later in real attacks. πŸ•΅οΈβ€β™€οΈ

greynoise.io/blog/christmas-sc

#GreyNoise #Ransomware #InitialAccess #IAB #Recon

2026-01-07

Back from the holidays and afraid to open your inbox? Same. Open the latest NoiseLetter instead.
greynoise.io/resources/noisele

GreyNoise boosted:
hrbrmstr πŸ‡ΊπŸ‡¦ πŸ‡¬πŸ‡± πŸ‡¨πŸ‡¦hrbrmstr
2026-01-03

slingers had a party goin' on since the 25th and are still doing more with less.

Ginormous session counts from a fraction of the IPs.

faceted bar charts highlighting an uptick in React2Shell since the 25th with yuge session countsIPv4 first seen distribution. 1029  before 2025 | 1304 on or after 2025 but before Dec 4 | 4962 Dec 4+world map with 101 countries highlighted
2025-12-31

New year, new opportunities? Check out our current openings for a new start in the new year! πŸͺ©πŸŽ‰

πŸ”— greynoise.io/careers

2025-12-17

GreyNoise is tracking a coordinated credential-based campaign targeting Cisco SSL VPN and Palo Alto Networks GlobalProtect.

πŸ”— greynoise.io/blog/credential-b

#Cisco #PaloAltoNetworks #GreyNoise #VPN #CiscoSSLVPN #GlobalProtect #ThreatIntel

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst