The Enterprise Attack Surface Has Grown Exponentially with Boom in Remote Work. Monitor & Protect It. - Learn More

Menu

Ready to Get
Started?

Contact Sales

Rachel Benson

What Can Censys Data See About Where You're Connecting From Now That You're Working From Home?

by Rachel Benson · April 23rd, 2020
Now that you're (probably) working from home, have you checked to see what might be exposed to the internet on your home network? Check out what Censys can find about your IP address. We just put up https://me.censys.io, the super easy way to see what Censys knows about where you're connecting from. A quick click and poof, you'll see ports we found open, banners we grabbed, and more.

Assessing January 2020's Windows Remote Desktop Web Access Vulnerabilities

by Rachel Benson · January 17th, 2020
We walk through how to investigate this month’s Microsoft Windows Remote Desktop Gateway (RD Gateway) vulnerabilities with a system like Censys.

Find 35-50% More Hosts on 1000+ New Ports

by Rachel Benson · December 4th, 2019
We’ve recently added a significant amount of data about 1000 additional ports that you can use to search for assets on uncommon ports. This Universal Internet Data Set data set, this new data set gives you more data about more things! Some of the new ports we’re scanning will help you find things like Kibana, Docker, Redis, and ElasticSearch, for example. To get the full list of these new protocols, head over to our technical documentation page.

Introducing the Censys SaaS Platform

by Rachel Benson · October 29th, 2019
Censys is proud to announce the commercial availability and official launch of our new SaaS Platform, providing organizations a vast and complete inventory of all assets on the internet and enabling them to understand exposure and prevent breaches.

Another Critical Exim Flaw, and How to Determine if You’re Affected

by Rachel Benson · September 30th, 2019
Exim, the widely used, open-source mail transfer agent (MTA), released an urgent security update regarding Exim versions, up to and including 4.92.2. The vulnerability (CVE-2019-16928) is a heap-based buffer overflow (memory corruption) issue in string_vformat defined in string.c file of the EHLO Command Handler component, allowing hackers to trigger a denial of service on a targeted Exim server using a specifically crafted line in the EHLO command.

Discover SSL/TLS Protocol in Use in Your Organization

by Rachel Benson · March 24th, 2019
Censys indexes TLS certificates associated with hosts and services and also tracks a few specific vulnerabilities, which means you can use it to find outdated, insecure devices and certificates in your organization. We’ll take you through a few of those searches, related to TLS.

Banners from Top 1,000 Ports Now Available to Enterprise Customers

by Rachel Benson · March 20th, 2019
Censys now performs broad, lightweight scans on over 1,000 TCP/IP services and publishes a daily snapshot that includes the certificates and banners found on each host.

Ready to Get Started?

Get a real-time view of all your organization's assets so you can proactively prevent threats.