New Research: Attack Surfaces in Healthcare from a Hacker’s Point of View - Download Now

Menu

Ready to Get
Started?

Contact Sales

Rachel Benson

Assessing January 2020's Windows Remote Desktop Web Access Vulnerabilities

by Rachel Benson · January 17th, 2020
We walk through how to investigate this month’s Microsoft Windows Remote Desktop Gateway (RD Gateway) vulnerabilities with a system like Censys.

Find 35-50% More Hosts on 1000+ New Ports

by Rachel Benson · December 4th, 2019
We’ve recently added a significant amount of data about 1000 additional ports that you can use to search for assets on uncommon ports. This Universal Internet Data Set data set, this new data set gives you more data about more things! Some of the new ports we’re scanning will help you find things like Kibana, Docker, Redis, and ElasticSearch, for example. To get the full list of these new protocols, head over to our technical documentation page.

Introducing the Censys SaaS Platform

by Rachel Benson · October 29th, 2019
Censys is proud to announce the commercial availability and official launch of our new SaaS Platform, providing organizations a vast and complete inventory of all assets on the internet and enabling them to understand exposure and prevent breaches.

Another Critical Exim Flaw, and How to Determine if You’re Affected

by Rachel Benson · September 30th, 2019
Exim, the widely used, open-source mail transfer agent (MTA), released an urgent security update regarding Exim versions, up to and including 4.92.2. The vulnerability (CVE-2019-16928) is a heap-based buffer overflow (memory corruption) issue in string_vformat defined in string.c file of the EHLO Command Handler component, allowing hackers to trigger a denial of service on a targeted Exim server using a specifically crafted line in the EHLO command.

Banners from Top 1,000 Ports Now Available to Enterprise Customers

by Rachel Benson · March 20th, 2019
Censys now performs broad, lightweight scans on over 1,000 TCP/IP services and publishes a daily snapshot that includes the certificates and banners found on each host.

Ready to Get Started?

Get a real-time view of all your organization's assets so you can proactively prevent threats.