Censys unveils two new product tiers to help researchers enhance their threat hunting work

Censys announced two new product tiers of its search tool, Censys Search Solo and Censys Search Teams.
These additions are part of a series of strategic initiatives to enhance the security community, including the introduction of Threat Hunting Boot Camps, the Censys Beta Workshop, which provides beta access to CensysGPT and Map to Censys, and significant upgrades to its product infrastructure.
Known for its commitment to the cybersecurity industry, Censys' community has grown to nearly half a million users over the last seven years, enabling them to gain a unique perspective to address the needs of cybersecurity teams and individuals.
In today's threat landscape, where time and resources are often limited, especially for smaller teams, the ability to proactively monitor for threats is crucial, irrespective of team size or budget.
Understanding these challenges, Censys tailored Censys Search Solo and Censys Search Teams to cater to the varied needs of all security teams.
Censys Search Solo: Designed for sole practitioners who require more robust capabilities than Censys' Community version.
Censys Search Solo users benefit from advanced features, like tags and comments for organized search management, matched services to highlight relevant host services and custom field selection for precise data extraction.
Censys Search Teams: Specifically designed for small security teams, this tier extends the benefits of the Solo tier and introduces additional features for a comprehensive, collaborative approach to threat hunting.
The higher API rate allows for swift navigation through Censys' extensive dataset, streamlining the detection and analysis of threats.
Censys recognizes that shared insights and knowledge are key to collective growth.
To support this vision, the company hosts Threat Hunting Boot Camps designed to share techniques, tips and tricks among security researchers to enhance their skills and capabilities.
Censys introduced the Censys Beta Workshop- a dedicated space for crafting, refining, and testing prototypes and beta projects.
This initiative aims to bridge communication between Censys and its vibrant community, enabling them to collaboratively shape the future of technology.
CensysGPT uses artificial intelligence to allow users to craft their search queries using natural language, reducing the learning curve.
CensysGPT can translate queries from Shodan, Zoomeye, and SecurityTrails into Censys Search Language, allowing users to leverage the capabilities of various platforms.
Map of Censys offers a new perspective on data visualization, providing developers with tools and features to navigate and interact with geographical datasets.
In the continued spirit of innovation and its commitment to excellence, Censys rolled out a series of significant upgrades to its product infrastructure over the past year.
Among those enhancements, Censys launched Certs 2.0, delivering better, more reliable access to the most extensive collection of X.509 certificates in existence with daily refreshes and revocation checks and more.
Censys launched Predictive Scanning, a research-backed scanning technique used to discover services across 65,000 ports.
To make digesting all of that data even easier, Censys added 4,000+ software and device labels so customers can focus on specific software or services of interest within Censys Search.


This Cyber News was published on www.helpnetsecurity.com. Publication date: Tue, 12 Dec 2023 15:43:06 +0000


Cyber News related to Censys unveils two new product tiers to help researchers enhance their threat hunting work

Censys unveils two new product tiers to help researchers enhance their threat hunting work - Censys announced two new product tiers of its search tool, Censys Search Solo and Censys Search Teams. These additions are part of a series of strategic initiatives to enhance the security community, including the introduction of Threat Hunting Boot ...
11 months ago Helpnetsecurity.com
What Is Cyber Threat Hunting? - Cyber threat hunting involves proactively searching for threats on an organization's network that are unknown to traditional cybersecurity solutions. A recent report from Armis found that cyber attack attempts increased by 104% in 2023, underscoring ...
9 months ago Techrepublic.com
Top 7 Cyber Threat Hunting Tools for 2024 - Cyber threat hunting is a proactive security measure taken to detect and neutralize potential threats on a network before they cause significant damage. To seek out this type of threat, security professionals use cyber threat-hunting tools. With ...
9 months ago Techrepublic.com
New infosec products of the week: December 15, 2023 - Here's a look at the most interesting products from the past week, featuring releases from Censys, Confirm, Drata, Safe Security, and SpecterOps. Nemesis: Open-source offensive data enrichment and analytic pipeline. Nemesis is a centralized data ...
11 months ago Helpnetsecurity.com
How to Create a Threat Hunting Program for Your Business - A threat hunter's job is to proactively seek out potential problems and stop them before they have a chance to harm a company's network. Here's how businesses can create their own threat hunting programs and why it's important to do so. As well as ...
9 months ago Cyberdefensemagazine.com
How to Overcome the Most Common Challenges with Threat Intelligence - Today's typical approach to threat intelligence isn't putting organizations in a place to do that. Instead, many threat intelligence tools are delivering too much uncurated and irrelevant information that arrives too late to act upon. Organizations ...
10 months ago Cyberdefensemagazine.com
CVE-2024-26626 - In the Linux kernel, the following vulnerability has been resolved: ...
8 months ago
URL Hunting: Proactive Cybersecurity Designed to Improve Outcomes - Lately, our sales teams have found a message that's resonating within the business community: IT administrators are looking for more proactive ways to identify and evaluate threats within their company's email data. They want to be able to extend ...
10 months ago Cyberdefensemagazine.com
Securing Remote Work: A Guide for Businesses - This article aims to provide businesses with a comprehensive guide to securing remote work, covering the essential components of remote work security policies and exploring best practices for ensuring secure communication. By implementing these ...
9 months ago Securityzap.com
2023 Updates in Review: Malware Analysis and Threat Hunting - Throughout ReversingLabs' 14-year history, our products have constantly excelled and improved to tailor the needs of our customers and match the changing cybersecurity threat landscape. This past year, we have delivered key improvements to ...
10 months ago Securityboulevard.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
11 months ago Esecurityplanet.com
TeamCity Intrusion Saga: APT29 Suspected Among the Attackers Exploiting CVE-2023-42793 - As part of this analysis, we look at threat actor TTPs employed throughout the intrusion and how they were identified and pieced together by the FortiGuard IR team. The following section of this report focuses on the activities of one of these threat ...
11 months ago Feeds.fortinet.com
Cybersecurity in the Age of Remote Work - The shift towards remote work has brought numerous benefits, but it has also exposed organizations to new cybersecurity risks. We will uncover key insights and best practices to ensure the safety of operations in the age of remote work. In ...
8 months ago Securityzap.com
Trustwave Relaunches Advanced Continual Threat Hunting with Human-Led Methodology - Trustwave recently relaunched its Advanced Continual Threat Hunting with Human-Led Methodology offering. The security solution provides organizations with a human-led methodology for continual threat hunting, vulnerability analysis, threat ...
1 year ago Csoonline.com
Cybersecurity for Remote Work: Securing Virtual Environments and Endpoints - Remote work surged in popularity out of necessity during the COVID-19 pandemic but seems to be here to stay, thanks to its unique advantages. With the rise in remote work also comes an increase in cybersecurity challenges spurned by the circumstances ...
10 months ago Cybersecurity-insiders.com
How machine learning helps us hunt threats | Securelist - In this post, we will share our experience hunting for new threats by processing Kaspersky Security Network (KSN) global threat data with ML tools to identify subtle new Indicators of Compromise (IoCs). The model can process and learn from millions ...
1 month ago Securelist.com
macOS Malware Mix & Match: North Korean APTs Stir Up Fresh Attacks - North Korean advanced persistent threat groups are mixing and matching components of two recently unleashed types of Mac-targeted malware to evade detection and fly under the radar as they continue their efforts to conduct operations at the behest of ...
11 months ago Darkreading.com
Why the Keitaro TDS keeps causing security headaches - A software company named Keitaro has long been labeled by cybersecurity vendors as a legitimate traffic distribution system vendor, yet the company's product is repeatedly used for malicious activity by cybercriminals. Despite being described as a ...
7 months ago Techtarget.com
Staying ahead of threat actors in the age of AI - At the same time, it is also important for us to understand how AI can be potentially misused in the hands of threat actors. In collaboration with OpenAI, today we are publishing research on emerging threats in the age of AI, focusing on identified ...
9 months ago Microsoft.com
How to turn shadow IT into a culture of grassroots innovation - Total, centralized IT control is no longer practical now that hybrid work and BYOD are here to stay. When users look for new ways to get work done, the solutions they find can be the seeds of innovation and the key to unleashing productivity and ...
10 months ago Helpnetsecurity.com
It's Time to Tear Down the Barriers Preventing Effective Threat Intelligence - Today, organizations are confronted with a deluge of cyber threats, ranging from sophisticated AI-powered ransomware to tried and true brute force attacks. At this point, IT security teams know it's essential to stay one step ahead of cybercriminals, ...
9 months ago Cyberdefensemagazine.com
The Case Study: The Exploitation of Business Assets - The role of this case study is to explain how it's feasible to exploit some business assets using the IoT search engines and some hacking tools. In this chapter, we would apply the Censys searching tool for crawling the web in a quite wide context, ...
10 months ago Cyberdefensemagazine.com
Revolutionizing WordPress Bug Bounty and Security: Latest Enhancements to the Wordfence Bug Bounty Program - Our team has triaged around 2,140 vulnerability submissions, with about 1,320 deemed in-scope. Together with our researchers and software vendors, we've protected millions of websites from vulnerabilities - and this is just the beginning. We're ...
6 months ago Wordfence.com
8 Strategies for Defending Against Help Desk Attacks - COMMENTARY. Defensive security techniques often lag offensive attack tactics, opening companies to heightened risk from rapidly evolving threats. An alarming case in point is the help desk, one of today's most exposed organizational Achilles' heels. ...
10 months ago Darkreading.com
30k Internet-Exposed QNAP NAS Devices Affected by Recent Vulnerability - Attack surface management firm Censys has identified roughly 30,000 internet-exposed QNAP network-attached storage appliances that are likely affected by a recently disclosed critical-severity code injection vulnerability. Tracked as CVE-2022-27596, ...
1 year ago Securityweek.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)