Censys (@censysio) 's Twitter Profile
Censys

@censysio

Censys is the source for real-time Internet intelligence and actionable threat insights for governments, F500 companies, and leading threat intel providers

ID: 3566263693

linkhttps://www.censys.com calendar_today15-09-2015 01:26:48

2,2K Tweet

9,9K Followers

1,1K Following

Censys (@censysio) 's Twitter Profile Photo

Query of the week: how to find eTLD+3 or greater subdomains in certificate names on Censys. Check it out here! community.censys.com/censys-platfor…

Query of the week: how to find eTLD+3 or greater subdomains in certificate names on Censys. Check it out here! community.censys.com/censys-platfor…
Censys (@censysio) 's Twitter Profile Photo

Trend Micro recently uncovered a campaign abusing TikTok to distribute malware via AI-generated videos, tricking users into installing infostealers. Using Trend Micro's IOCs, we identified related infrastructure, including a newer bulletproof provider: censys.com/blog/tiktok-an…

Censys (@censysio) 's Twitter Profile Photo

This week's cool query of the week shows you how to find hosts with open directories with executable files in endpoint HTTP bodies. Check it out here! community.censys.com/censys-platfor…

This week's cool query of the week shows you how to find hosts with open directories with executable files in endpoint HTTP bodies. Check it out here! community.censys.com/censys-platfor…
Censys (@censysio) 's Twitter Profile Photo

Thousands of compromised ASUS routers are being co-opted into a volatile but persistent botnet. Our latest blog takes IoCs from GreyNoise and breaks down how the AyySSHush campaign has evolved over the past 5 months — and what makes it stand out: censys.com/blog/tracking-…

Censys (@censysio) 's Twitter Profile Photo

In October 2024, Censys researchers discovered ~400 U.S. water facility web-based HMIs exposed online. Within a month of sharing data with the EPA and the vendor, 58% of systems were protected. Read more here: censys.com/blog/turning-o…

Censys (@censysio) 's Twitter Profile Photo

A defining moment for Censys - We are excited to announce that the Threat Hunting Module in the new Censys Platform is now #GA! censys.com/blog/internet-…

A defining moment for <a href="/censysio/">Censys</a> - We are excited to announce that the Threat Hunting Module in the new Censys Platform is now #GA!

censys.com/blog/internet-…
Censys (@censysio) 's Twitter Profile Photo

We used the new Censys Threat Hunting Module to investigate a Colombian threat actor, uncovering a series of remote access trojan (RAT) C2 servers. We also show how to use this information to create a set of IOCs for defensive measures: censys.com/blog/unmasking…

We used the new Censys Threat Hunting Module to investigate a Colombian threat actor, uncovering a series of remote access trojan (RAT) C2 servers. 

We also show how to use this information to create a set of IOCs for defensive measures: censys.com/blog/unmasking…
Censys (@censysio) 's Twitter Profile Photo

We’re excited to announce the release of CVE Exploit Context on Censys ASM! This new feature adds valuable insights to vulnerabilities that are exploited by attackers in the wild, helping security teams better prioritize risk. hubs.ly/Q03skPzJ0 #ASM #ExposureManagement #CVE

We’re excited to announce the release of CVE Exploit Context on Censys ASM! This new feature adds valuable insights to vulnerabilities that are exploited by attackers in the wild, helping security teams better prioritize risk.
hubs.ly/Q03skPzJ0
#ASM #ExposureManagement #CVE
Censys (@censysio) 's Twitter Profile Photo

🚨 Cert Happens. Are you watching yours? If someone issues a certificate that looks like yours, it could be used to: 🔸 Phish your customers 🔸 Deliver malware 🔸 Impersonate your brand Certificate Transparency (CT) + Censys Collections can help: hubs.ly/Q03sMDyV0

🚨 Cert Happens. Are you watching yours?

If someone issues a certificate that looks like yours, it could be used to:
🔸 Phish your customers
🔸 Deliver malware
🔸 Impersonate your brand

Certificate Transparency (CT) + Censys Collections can help:
hubs.ly/Q03sMDyV0
Censys (@censysio) 's Twitter Profile Photo

🔍We looked at the C2 server associated with the #Flodrix #botnet and used an internet-exposed RPC service to uncover a world-readable NFS mount and 745 compromised hosts! 👀 hubs.ly/Q03sTqVc0 #CVE20253248 #Malware #InfoSec #Cybersecurity #CyberAttack #exploit

🔍We looked at the C2 server associated with the #Flodrix #botnet and used an internet-exposed RPC service to uncover a world-readable NFS mount and 745 compromised hosts!

👀 hubs.ly/Q03sTqVc0 

#CVE20253248 #Malware #InfoSec #Cybersecurity #CyberAttack #exploit
Censys (@censysio) 's Twitter Profile Photo

🔌 #Iran Internet #Outage Update ---- June 21 marked lowest visibility—but signs of recovery. 📉 Some networks (e.g., DATAK, HAMYAR-AS) remain unstable. 📈 Others (e.g., RESPINA-AS, MOBINNET-AS) are bouncing back strong. 🔎 View at #Censys: hubs.ly/Q03tdDjH0

🔌 #Iran Internet #Outage Update
----
June 21 marked lowest visibility—but signs of recovery.
📉 Some networks (e.g., DATAK, HAMYAR-AS) remain unstable.
 📈 Others (e.g., RESPINA-AS, MOBINNET-AS) are bouncing back strong.

🔎 View at #Censys: hubs.ly/Q03tdDjH0
Censys (@censysio) 's Twitter Profile Photo

Censys researcher on CBS Philadelphia this morning discussing how they used the Censys platform to identify toll scam infrastructure. Check it out: x.com/CBSPhiladelphi…

Censys researcher on <a href="/CBSPhiladelphia/">CBS Philadelphia</a> this morning discussing how they used the Censys platform to identify toll scam infrastructure. Check it out:

x.com/CBSPhiladelphi…
Censys (@censysio) 's Twitter Profile Photo

🚨 New Censys Advisory: 3 critical CVEs hit Citrix NetScaler—incl. CVE-2025-5777 ("#CitrixBleed2") enabling memory leaks & session hijacking. 📉 69K+ exposed online 🔎 Censys queries in advisory blog: Details: hubs.ly/Q03v53mv0 #CVE2025 #NetScaler #CyberSecurity

🚨 New Censys Advisory:
3 critical CVEs hit Citrix NetScaler—incl. CVE-2025-5777 ("#CitrixBleed2") enabling memory leaks &amp; session hijacking.
📉 69K+ exposed online
🔎 Censys queries in advisory blog:

Details: hubs.ly/Q03v53mv0

#CVE2025 #NetScaler #CyberSecurity
Censys (@censysio) 's Twitter Profile Photo

Multiple US gov agencies have warned orgs to stay vigilant for potential Iran-affiliated cyber activity. We studied exposure of 4 vendors previously known to be of interest to IR-affiliated groups. Read more: censys.com/blog/ics-iran-…

Multiple US gov agencies have warned orgs to stay vigilant for potential Iran-affiliated cyber activity. We studied exposure of 4 vendors previously known to be of interest to IR-affiliated groups. 

Read more: censys.com/blog/ics-iran-…
Censys (@censysio) 's Twitter Profile Photo

🌍 Speak your language. Search the Internet. Censys Query Assistant turns Arabic, French, German, Japanese & more into valid CQL—no syntax needed. Try it for free: accounts.censys.io/register #CyberSecurity #AI #Censys #ThreatHunting youtu.be/-8A6BxX7V4w?fe…

Censys (@censysio) 's Twitter Profile Photo

🚨 CVE-2024-54085: Critical auth bypass in AMI MegaRAC SPx (CVSS 10.0) lets attackers spoof headers to gain full BMC access—no creds needed. Censys sees 4K+ exposed hosts. 🛠️ Patch now or isolate BMCs. 🔗 hubs.ly/Q03vGLL_0 #CVE202454085 #AMI #CyberSecurity #KEV #Redfish

🚨 CVE-2024-54085: Critical auth bypass in AMI MegaRAC SPx (CVSS 10.0) lets attackers spoof headers to gain full BMC access—no creds needed.

Censys sees 4K+ exposed hosts.
🛠️ Patch now or isolate BMCs.
🔗 hubs.ly/Q03vGLL_0

#CVE202454085 #AMI #CyberSecurity #KEV #Redfish