If youβre passionate about broadening who gets seen, heard, and valued in this field, attend and lets continue the conversation in person. www.mincybsec.org/an...
12.02.2026 12:46 β π 0 π 0 π¬ 0 π 0@ntkramer.bsky.social
Experienced InfoSec | Elder Millennial | πΌ @GreyNoiseIO | I ask 'why?' a lot | Pro Oxford Comma | Fix it! | He/Him | #BLM | Views are my own. https://linktr.ee/glennthorpe
If youβre passionate about broadening who gets seen, heard, and valued in this field, attend and lets continue the conversation in person. www.mincybsec.org/an...
12.02.2026 12:46 β π 0 π 0 π¬ 0 π 0(beyond job titles, traditional career paths, and gatekeeping checklists)
12.02.2026 12:46 β π 0 π 0 π¬ 1 π 0Excited to share that I've been asked to speak at the Minorities in Cybersecurity Conference this March!
Iβll be on a panel βHow Do You Define Cybersecurity Experience? A Change in Perspectiveβ where weβll dig into what really counts as cybersecurity experience
My latest pet project, an RSS feed to alert you to the silent KEV knownRansomwareCampaignUse flips!
(Did you know there were four CVEs flipped last week?) #threatintel
We're tracking it here: viz.greynoise.io/tag...
Appears to be from github.com/Ashwesker...
2/2
π© & #threatintel - 95% of exploitation attempts targeting CVE-2026-20045, a critical vulnerability in Cisco Unified Communications Manager, have used a distinctive user-agent: Mozilla/5.0 (compatible; CiscoExploit/1.0) and are heavily targeting our Cisco Unified Communications Manager sensors.
1/2
β & #threatintel - Two campaigns (100x spike!) are hitting Ivanti Connect Secure; one loud (34K sessions from Romania/Moldova), one stealthy (~6K distributed IPs). Both target a pre-exploitation endpoint for CVE-2025-0282.
29.01.2026 17:20 β π 1 π 0 π¬ 0 π 0CISA's KEV hit 1,500 yesterday. I'm working on a cool #threatintel blog (yes, I'm biased) about additional hidden intel in KEV that should be published soon, along with a helpful tool hosted by GreyNoise! :)
28.01.2026 17:33 β π 1 π 0 π¬ 0 π 0If I recall correctly, this is the first time the due date has been modified.
In all honesty, if you haven't already patched this vulnerability, it's likely too late. As a reminder, patching does not boot attackers, so you should check for indicators of compromise.
2/2
β & #threatintel: CISA has moved the due date for mitigating CVE-2025-55182 (Meta React Server Components Remote Code Execution Vulnerability) up by two weeks. It was initially set for December 26, but it is now due on December 12.
1/2
Ron & my talk from SuriCon 2025 | Abusing HTTP Quirks to Evade Detection
I think it turned out pretty well; pardon the disco effect where a stage light was failing :)
www.youtube.com/watc...
CC: @iagox86.bsky.social @greynoise.io
Network protocols are messy! Sure, there are standards β RFCs, IEEEs, you name it β but there are also multiple ways to do basically everything. If youβre relying on network IDS/IPS tools like Suricata, I have bad news β a sufficiently clever attacker can bypass *a lot* of your signatures, leaving you completely blind. The cool part about HTTP is that, at every level of the stack, your software tries to make sense of the userβs (aka: the attackerβs) requests. From the web server (Apache, IIS, etc) to the language parser (PHP, .NET, etc) β everything just wants your requests to work, often at the expense of security! Thatβs great for ensuring the internet keeps working, but creates makes it *really* hard to write signatures! This talk will start with the basics: weβll look at HTTP requests and learn the in-depth quirks of how the protocol works. Then weβll look at a variety of different HTTP-based exploits (path traversal, SQL injection, shell command injection, and more!). Weβll exam
Ron (@iagox86.bsky.social) and I are presenting at #Suricon (Montreal) next month! If you're around, you'll definitely want to find us for some sweet swag (oh, and our talk is pretty cool too!).
suricon.net/agenda-m...
Itβs time for many folksβ annual cultural learning session. π€£
03.10.2025 12:22 β π 1 π 0 π¬ 0 π 0On 28 September, GreyNoise observed a sharp one-day surge in attempts to exploit Grafana CVE-2021-43798. Full analysis & malicious IPs β¬οΈ
#Grafana #GreyNoise #ThreatIntel
We all know that @hrbrmstr.dev is a mad scientist, and when you give him the amazing telemetry our new fleet has been collecting lately, you get knowledge drops like this! Super proud of our @greynoise.io teamβs work on the deception capabilities we now have! hashtag#threatintel
01.08.2025 15:24 β π 1 π 2 π¬ 0 π 0An unexpected cluster of malicious IPs in a remote U.S. town led GreyNoise researchers to uncover a 500+ device botnet. Full analysis β¬οΈ
#Cybersecurity #ThreatIntel #Botnet #VoIP #GreyNoise #Cyber #Tech
π CVE-2017-18370 (Zyxel P660HN)
Oldie but goodie.
viz.greynoise.io/tag...
4/4
β‘ CVE-2024-20439 (Cisco Smart Licensing Utility) (9.8/10, KEV)
Hardcoded credentials have been known since late last year.
viz.greynoise.io/tag...
3/4
π₯ CVE-2025-49132 (Pterodactyl Panel RCE) (10/10 RCE)
Active exploitation observed within days of disclosure.
viz.greynoise.io/tag...
2/4
π« & #threatintel - noticing a few other spikes orgs should be mindful of:
π₯ CVE-2025-49132 (Pterodactyl Panel RCE) (10/10 RCE)
β‘ CVE-2024-20439 (Cisco Smart Licensing Utility) (9.8/10, KEV)
π CVE-2017-18370 (Zyxel P660HN)
1/4
The main takeaway is we, first hand, observed exploitation almost two weeks before the POC was released, so ensure all retro threat hunting goes back at LEAST a month, but ideally further.
2/2
π©Έ& #threatintel | We (GreyNoise) just published a quick note (www.greynoise.io/blo...) regarding CVE-2025-5777 - CitrixBleed 2
1/2
...here: viz.greynoise.io/tag...
2/2
π₯ & #threatintel - Thanks to @horizon3ai.bsky.social, we pushed a tag out today for CitrixBleed 2 CVE-2025-5777 and are backfilling. Currently, we see 233 hits starting on July 1 from:
64.176.50[.]109
38.154.237[.]100
102.129.235[.]108
121.237.80[.]241
45.135.232[.]2
Follow along...
1/2
Just a totally normal trip home from the airport last night⦠passing the national guard rolling down the highway as they prepare for NO KINGS DAY protests. F this administration. About 3 more months before they start trying to censor social media via tech controls.
Seems like a lot of work when you could have found 200 year old brain proteins in the US Congress rn.
phys.org/news/2025-0...
It's hard to beat good deception. :)
28.05.2025 15:38 β π 7 π 0 π¬ 0 π 0If you're ever feeling lonely, just close Zoom.
This works because a funny thing always happens: a random last-minute Zoom will appear if you close it completely.
π₯€& #threat-intel: CISA added Langflow Code Injection CVE-2025-3248 to the KEV on May 5. Recently, it has garnered considerable attention, with South Korea leading the pack. This vuln enables unauthenticated attackers to execute arbitrary code via /api/v1/validate/code
viz.greynoise.io/tag...