Forrester & Censys | Cybersecurity Predictions for 2021 | On-Demand Webinar | Stream Now!

Rachel Benson

What Can Censys Data See About Where You're Connecting From Now That You're Working From Home?

by Rachel Benson · April 23rd, 2020
Now that you're (probably) working from home, have you checked to see what might be exposed to the internet on your home network? Check out what Censys can find about your IP address. We just put up, the super easy way to see what Censys knows about where you're connecting from. A quick click and poof, you'll see ports we found open, banners we grabbed, and more.

Assessing January 2020's Windows Remote Desktop Web Access Vulnerabilities

by Rachel Benson · January 17th, 2020
We walk through how to investigate this month’s Microsoft Windows Remote Desktop Gateway (RD Gateway) vulnerabilities with a system like Censys.

Find 35-50% More Hosts on 1000+ New Ports

by Rachel Benson · December 4th, 2019
We’ve recently added a significant amount of data about 1000 additional ports that you can use to search for assets on uncommon ports. This Universal Internet Data Set data set, this new data set gives you more data about more things! Some of the new ports we’re scanning will help you find things like Kibana, Docker, Redis, and ElasticSearch, for example. To get the full list of these new protocols, head over to our technical documentation page.

Introducing the Censys SaaS Platform

by Rachel Benson · October 29th, 2019
Censys is proud to announce the commercial availability and official launch of our new SaaS Platform, providing organizations a vast and complete inventory of all assets on the internet and enabling them to understand exposure and prevent breaches.

Another Critical Exim Flaw, and How to Determine if You’re Affected

by Rachel Benson · September 30th, 2019
Exim, the widely used, open-source mail transfer agent (MTA), released an urgent security update regarding Exim versions, up to and including 4.92.2. The vulnerability (CVE-2019-16928) is a heap-based buffer overflow (memory corruption) issue in string_vformat defined in string.c file of the EHLO Command Handler component, allowing hackers to trigger a denial of service on a targeted Exim server using a specifically crafted line in the EHLO command.